0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:12 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x10000000}, 0x0) 14:54:12 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x65580000}, 0x0) [ 1274.474325][T30536] overlayfs: unrecognized mount option "lowerdi" or missing value 14:54:12 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:12 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00082dbd7000fbdbdf25068000000800040003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r5}, 0x14) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r4, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r6 = geteuid() lchown(&(0x7f0000000140)='./file2\x00', r6, r2) 14:54:12 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x81000000}, 0x0) 14:54:12 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x40000000}, 0x0) 14:54:12 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x0, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:12 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:12 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) write$binfmt_aout(r0, &(0x7f00000000c0)={{0x0, 0x7, 0xffffffffffffffdf, 0x17b, 0x33a, 0x4, 0x24d, 0xffff}, "b37c88188826860a3c034de73cfe778313d017e05c58817cb6e8aa3dc14becad34c9428a5c86c807047766737299be850037e4772fb89e8dc09f617f71fff1b2b623ceae85008afc997e", [[]]}, 0x16a) socket$inet(0x2, 0x0, 0xfffffffffffff036) write$binfmt_script(r0, 0x0, 0x0) 14:54:12 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x88a8ffff}, 0x0) 14:54:12 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x60000000}, 0x0) 14:54:13 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:13 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xa0010000}, 0x0) 14:54:13 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x65580000}, 0x0) 14:54:13 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) [ 1275.568943][T30614] overlayfs: filesystem on './file0' not supported as upperdir 14:54:13 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c000000611d844885f3dbccddaa19645e7cf8e4b1339298a5c683311b3d9e64b2648392bd145614060000e1ffffff00bb619e4851c6474918d414adb99dc632d38bf9b6aa342608d234530641585af218b95e710b7d9eb8a6cdfae7678c3b55778a2ee14f2410311dc484860548faa6f63a56b06a2611099811c0bfbbbe52b0075f2353482f9ec7e75011eb3fe14e6dfe1d5c74936555a30db0077669c4b0e416d068feaaa0bf2b2fde5049dbf71128ed874fb90967d0cafc1c952a8bc627b37ed951dd7b8fd8be7526e2e5db14e2088aa2bc7d7f0bcf40f5f666f25dab8481fd15e2d65728b5e539647343f6a7ad90d4c26f8a6b5779d0b586e763dfc7a9a4ec382f11555e9b671fd58aa1466cf8bd1fff509b0ded4aeb16ea54c2373199763505539d32695a63d4fdcc32cf000000000000000000000003a7199c0493fa11bc8ec664e32f6bd6cebd550dd2985f6f5c5cd3d84a55c042366dc35feb6bc5148889d6819ef76246a09c9fc23a47", @ANYRES16=0x0, @ANYBLOB="00080e9d0a3928c96d896e8e2dbd95eb69860692a3f2a7447000fbdbdf250600"], 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r4}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r3, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:13 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x0, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:13 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xc3ffffff}, 0x0) 14:54:13 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x81000000}, 0x0) 14:54:13 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x88a8ffff}, 0x0) 14:54:13 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000600)="4c000000130081f87059ae08060c040002006b10400103fe0500018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82afb9fbc7a461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:54:13 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xffffa888}, 0x0) 14:54:13 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:14 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:14 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x0, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:14 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xffffffc3}, 0x0) 14:54:14 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xa0010000}, 0x0) [ 1276.604894][T30677] overlayfs: filesystem on './file0' not supported as upperdir 14:54:14 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f0000000140)) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r4}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r3, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:14 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:14 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x1a0ffffffff}, 0x0) 14:54:14 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x80, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f00000000c0)=""/83) listen(r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000740)='rc\x00\x00\x00\x00\x00\x00\x00\x04\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:54:14 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xc3ffffff}, 0x0) 14:54:14 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:14 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x40030000000000}, 0x0) 14:54:14 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x0, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:15 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xffffa888}, 0x0) 14:54:15 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:15 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xa0010000000000}, 0x0) 14:54:15 executing program 3: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) syz_open_procfs$namespace(r0, &(0x7f0000000100)='ns/cgroup\x00') r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000140)={{0x6, @bcast}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose]}, 0x48) listen(r1, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) r3 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000b40)=@nat={'nat\x00', 0x1b, 0x5, 0x620, 0x140, 0x278, 0x440, 0x278, 0x278, 0x550, 0x550, 0x550, 0x550, 0x550, 0x5, &(0x7f0000000280), {[{{@ipv6={@loopback, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}, [0x0, 0xff, 0xffffffff, 0xffffffff], [0x0, 0xffffffff, 0x0, 0xffffffff], 'veth0_to_bond\x00', 'ifb0\x00', {0xff}, {}, 0x87, 0x3, 0x1, 0x38}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0x16, 0x9, 0x9, 0x3, 0xcd3, 0x800, 0x200}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x2, @ipv6=@empty, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @gre_key=0x8000, @port=0x4e20}}}, {{@uncond, 0x0, 0x110, 0x138, 0x0, {}, [@common=@unspec=@limit={0x48, 'limit\x00', 0x0, {0x5, 0x0, 0xba40, 0x2, 0x3, 0x2d0, 0x2}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00', 0x0, {0x8, 0x0, 0xfffffffffffffffd}}}, {{@ipv6={@loopback, @loopback, [0x0, 0xffffff00, 0xffffff00], [0xffffff00, 0xffffffff, 0xffffffff, 0xffffffff], 'veth0_to_team\x00', 'veth1_to_bridge\x00', {0xff}, {0xff}, 0x0, 0x0, 0x5, 0x4a}, 0x0, 0x180, 0x1c8, 0x0, {}, [@common=@mh={0x28, 'mh\x00', 0x0, {0x20, 0x1}}, @common=@srh1={0x90, 'srh\x00', 0x1, {0xe7d894e0b8805cb4, 0x7, 0x0, 0x5, 0x6f2e, @rand_addr="81d488225c60d7f100d2e4061307ed41", @local, @empty, [0xffffffff, 0xffffffff, 0xffffffff], [0x0, 0xff, 0xff000000, 0xff], [0x0, 0xffffff00, 0xff000000], 0x2480, 0x109}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x16, @ipv6=@rand_addr="196926960ed30f024f6b2e4e35293a5f", @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @icmp_id=0x65, @icmp_id=0x68}}}, {{@ipv6={@empty, @initdev={0xfe, 0x88, [], 0x1, 0x0}, [0xffffffff, 0xff, 0xffffffff, 0xffffff00], [0xffffffff, 0x0, 0xff000000], 'nlmon0\x00', 'rose0\x00', {0xff}, {0xff}, 0xff, 0x7, 0x2, 0x20}, 0x0, 0xc8, 0x110}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x8, @ipv4=@multicast2, @ipv4=@dev={0xac, 0x14, 0x14, 0xa}, @icmp_id=0x67, @gre_key=0x3}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x680) r4 = dup(r1) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000040)={'eql\x00', 0x200}) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000200)) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x0) [ 1277.687156][T30782] overlayfs: filesystem on './file0' not supported as upperdir 14:54:15 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xffffffc3}, 0x0) 14:54:15 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:15 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x100000000000000}, 0x0) 14:54:15 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x0, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:15 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="1c000000f3d6f27c02c50bbb148a804028ba1de0ab674a2fc5cc2aecb4778bc8fb1fafae575efdecbd3b2c83b2d7ea0f5e4acc6afd78ac444e276c2b676086146c220871550000000000", @ANYRES16=0x0, @ANYBLOB="00082dbd7000fbdbdf25060000000800040003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r4}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r3, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="75707065726469723d2e2966696c6530416c6f7765726469323d2e3a66696c65302c2f66696c653100000000000000000046587568ac895921a2d2b6511c05cc0b51f9e48d4dfb7ed02f9cf6b9bb7e8928c0b851c76de92d17ee1044e5a6d5d5c659eb86a2d0f42d4b67007919a7cf3760728a068885d764b6616eafab6bfe351f4a0869bd14990902bd51ba"]) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:15 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = accept$inet(0xffffffffffffff9c, &(0x7f0000007380)={0x2, 0x0, @multicast2}, &(0x7f00000073c0)=0x10) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000007400)={0x6, {{0x2, 0x4e21, @rand_addr=0x9}}}, 0x88) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f0000000180)) lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.opaque\x00', &(0x7f0000000100)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00', 0xe, 0x1) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) 14:54:15 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x1a0ffffffff}, 0x0) 14:54:15 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:15 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x200000000000000}, 0x0) 14:54:16 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x40030000000000}, 0x0) [ 1278.420757][T30845] overlayfs: unrecognized mount option "/file1" or missing value 14:54:16 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:16 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x0, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:16 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x300000000000000}, 0x0) 14:54:16 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x10000, 0x80) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x0) 14:54:16 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000008c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) connect$unix(0xffffffffffffffff, 0x0, 0x24e) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000a40)=ANY=[@ANYBLOB="ebad3b1bf58d3ea1577ab1645027bb812fa8af8471c6e96943370be20a993ac9d708efb9a3652e61d5a46e5fb7ce5b349e7d1b6048b5649781ceef6ed923248085640830f5bb404107d974a8bc11e13b568c05a4e71bed8914a702a24b60fde78ab634049e70c8510f6c1aac7f6bc018eab8be07acfd5fe1c0742d41d6", @ANYRES16=0x0, @ANYBLOB="000c29bd70630f993dfe7af68900000000000241004688a2f13fc9f37a28fa7b79f74cd6f5000010004f6da1a63a73797a3000000000"], 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r5}, 0x14) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r4, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f77657264ca1788e7021fe42e3a66696c65302c770793e45991000000800000000006e5f7018e6abe3fae9d57ab83b5f1c097155e6a2cd6446c9400e2131e656638cb224c144c1fc6227e1315060edb1f14fb000000000000000000"]) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000007c0)={0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}}, [0x1, 0x291d, 0x401, 0x80000000, 0x2, 0x2, 0x9, 0x5, 0xef, 0x4, 0xfff, 0x7fff, 0x8000, 0x9, 0x7]}, &(0x7f0000000140)=0x100) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000340)={r6, 0x200}, &(0x7f00000003c0)=0x8) 14:54:16 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xa0010000000000}, 0x0) 14:54:16 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:16 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x400000000000000}, 0x0) 14:54:16 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) [ 1279.024383][T30923] overlayfs: unrecognized mount option "lowerdʈçä.:file0" or missing value 14:54:16 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x100000000000000}, 0x0) 14:54:16 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x500000000000000}, 0x0) 14:54:16 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x0, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:17 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) [ 1279.270494][T30946] overlayfs: unrecognized mount option "lowerdʈçä.:file0" or missing value 14:54:17 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x200000000000000}, 0x0) 14:54:17 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x600000000000000}, 0x0) 14:54:17 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x50, @time={0x77359400}, 0x80000000, {0x3f, 0x8}, 0x6, 0x2, 0xfff}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r1, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x7fffffffffffff, 0x0) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x0) 14:54:17 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c000013be4849a3d92c96f74b9c6ba8c77ac1849b30438732ed84b9c8d5840d9d3217bc93b53c3de2dbfcfa955db0bc13610ad74254667c999b62f454c8569fc43650e5ba", @ANYRES16=0x0, @ANYBLOB="00082dbd7000fbdbdf25060000000800040003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r4}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r3, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:17 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0x200006a9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:17 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x300000000000000}, 0x0) 14:54:17 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x800000000000000}, 0x0) 14:54:17 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x0, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:17 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0x7ffff000}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:17 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xa00000000000000}, 0x0) 14:54:17 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) accept4$inet(r2, &(0x7f0000000080)={0x2, 0x0, @remote}, &(0x7f00000000c0)=0x10, 0x800) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x321000, 0x0) ioctl$KVM_GET_SREGS(r3, 0x8138ae83, &(0x7f0000000280)) ioctl$VIDIOC_DBG_G_REGISTER(r3, 0xc0385650, &(0x7f0000000140)={{0x0, @addr=0x9}, 0x8, 0x81, 0x401}) write$binfmt_script(r0, 0x0, 0x0) 14:54:17 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x400000000000000}, 0x0) [ 1280.270146][T31001] overlayfs: filesystem on './file0' not supported as upperdir 14:54:18 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x64}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:18 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x500000000000000}, 0x0) 14:54:18 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000380), 0x3, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x1ca}}, 0x804) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r4}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r3, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:18 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xc00000000000000}, 0x0) 14:54:18 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x20000752}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:18 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:18 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x600000000000000}, 0x0) 14:54:18 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000200)={0x3ff, 0xf, 0x3}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) r2 = socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x80, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@broadcast, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f00000001c0)=0xe8) r5 = getegid() write$P9_RGETATTR(r3, &(0x7f0000000280)={0xa0, 0x19, 0x1, {0x480, {0x1, 0x0, 0x8}, 0x123, r4, r5, 0x7, 0x287977c4, 0x7, 0x100000001, 0x6, 0x3, 0xffffffffffffffc0, 0x7f, 0x14000000, 0x422, 0x5, 0x8, 0x7, 0x1, 0xce7}}, 0xa0) 14:54:18 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x7fffef57}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:18 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xe00000000000000}, 0x0) 14:54:18 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x800000000000000}, 0x0) [ 1281.126454][T31090] overlayfs: filesystem on './file0' not supported as upperdir 14:54:19 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x1000000000000000}, 0x0) 14:54:19 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0x2000084d}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:19 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:19 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(r0, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000140)='./file1/file0\x00', &(0x7f00000003c0)='./bus\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f00000009c0)={0x20f5, &(0x7f0000000a00)=[{}, {}, {}, {0x0}, {}, {}, {}]}) ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, &(0x7f0000000340)={r3, 0x10}) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000900)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000c29bd7000fddbdf2501000000000000001200001000137564703a73797a300000000000002dfcfa21d26f3b5cac0ae4ff05150000b90e18ae23248887db39486c0d87cd17ae176f0ae3c11eb498a48ac820576ec029f51c2771d36dc2f8f5f29579526a6519662df6"], 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000240)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e3a66696c65302c776f726b6469723d696c6531000200"]) recvfrom$unix(r5, &(0x7f00000007c0)=""/164, 0xa4, 0x101, &(0x7f0000000880)=@file={0x0, './file0/file1/file0\x00'}, 0xffffffffffffff07) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:19 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xa00000000000000}, 0x0) 14:54:19 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:54:19 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x3f00000000000000}, 0x0) 14:54:19 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xc00000000000000}, 0x0) [ 1281.811249][T31150] overlayfs: failed to resolve 'ile1': -2 14:54:19 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) [ 1281.992330][T31166] overlayfs: failed to resolve 'ile1': -2 14:54:19 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x4000000000000000}, 0x0) 14:54:19 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xe00000000000000}, 0x0) 14:54:20 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_open_dev$video4linux(&(0x7f00000003c0)='/dev/v4l-subdev#\x00', 0x1000, 0x40) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000140), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x9, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x3a8}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r4}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r3, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:20 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0x7fffeec5}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:20 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x6000000000000000}, 0x0) 14:54:20 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x1000000000000000}, 0x0) 14:54:20 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000080)) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:54:20 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0x2000095a}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:20 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x6558000000000000}, 0x0) 14:54:20 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x4000000000000000}, 0x0) 14:54:20 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) [ 1282.891364][T31241] overlayfs: filesystem on './file0' not supported as upperdir 14:54:20 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x8100000000000000}, 0x0) 14:54:20 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x6000000000000000}, 0x0) 14:54:20 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000340)=0x4000000) setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r5}, 0x14) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r4, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:20 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0x7fffedf8}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:21 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x7de}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:21 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x6558000000000000}, 0x0) 14:54:21 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x88a8ffff00000000}, 0x0) 14:54:21 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:54:21 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:21 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x8100000000000000}, 0x0) 14:54:21 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1002}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) [ 1283.955428][T31324] overlayfs: filesystem on './file0' not supported as upperdir 14:54:21 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1003}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:21 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000140)={0x5, 0x0, 0x5, 0x8, 0x3}) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r4}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r3, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="50d6b05b7ee94c9e6e6a7b1ff1a68c520c7eebfb9b2351a9dae9d50b9c010edbf4c86b5a4d326e"]) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:22 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x88a8ffff00000000}, 0x0) 14:54:22 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:22 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1004}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:22 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xc3ffffff00000000}, 0x0) 14:54:22 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) tee(r1, r1, 0x3, 0x1) 14:54:22 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xc3ffffff00000000}, 0x0) [ 1284.677137][T31367] overlayfs: unrecognized mount option "PÖ°[~éLžnj{ñ¦ŒR ~ëû›#Q©ÚéÕ œÛôÈkZM2n" or missing value 14:54:22 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1005}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:22 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xffffffffa0010000}, 0x0) [ 1284.901220][T31402] overlayfs: unrecognized mount option "PÖ°[~éLžnj{ñ¦ŒR ~ëû›#Q©ÚéÕ œÛôÈkZM2n" or missing value 14:54:22 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(0x0, 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:22 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1006}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:22 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r4}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r3, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696ce5302c6c6f7765726469723d2e3a66696c65302c776f726b6469723d2e2f66696c6531"]) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:23 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x2}, 0x0) 14:54:23 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') r2 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x3cf2, 0x2000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@empty}}, &(0x7f0000000280)=0xe8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x28, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@euid_lt={'euid<', r3}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x30, 0x32, 0x37, 0x73, 0x1313c04827bae4d4, 0x65, 0x63], 0x2d, [0x37, 0x31, 0x64, 0x63], 0x2d, [0x33, 0x37, 0x7f, 0x30], 0x2d, [0x28afc10938bf24fa, 0x0, 0x34, 0x75], 0x2d, [0x77, 0x63, 0x76, 0x35, 0x3f, 0x77, 0x35, 0x77]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'bcsf0\x00'}}]}}) syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:54:23 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1008}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:23 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xffffffff00000000}, 0x0) [ 1285.592005][T31443] overlayfs: failed to resolve './filå0': -2 14:54:23 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x3}, 0x0) 14:54:23 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x100a}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:23 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(0x0, 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) [ 1285.835433][T31443] overlayfs: failed to resolve './filå0': -2 14:54:23 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xffffffffa0010000}, 0x0) 14:54:23 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) r0 = accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r1, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000600)='./file1\x00', &(0x7f00000007c0)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000140)=0x7, &(0x7f0000000340)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r5}, 0x14) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r4, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:23 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x100c}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:23 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x200) ioctl$TCGETS(r0, 0x5401, &(0x7f00000000c0)) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000100)=""/246) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r1, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x0) 14:54:24 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x4}, 0x0) 14:54:24 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x2}, 0x0) 14:54:24 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x100e}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:24 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x3}, 0x0) 14:54:24 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(0x0, 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:24 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x5}, 0x0) 14:54:24 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1010}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) [ 1286.865041][T31549] overlayfs: filesystem on './file0' not supported as upperdir 14:54:24 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x4}, 0x0) 14:54:24 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x6}, 0x0) 14:54:25 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0xfffffffffffffea2) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$setperm(0x5, r2, 0x2000000) close(r1) write$binfmt_script(r0, 0x0, 0x0) 14:54:25 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x5}, 0x0) 14:54:25 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="00c8fee4b4e9cd78b2000000", @ANYRES16=0x0, @ANYBLOB="00082dbd7000fbdbdf25060000000800040003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r5}, 0x14) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r4, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, r2}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000340)='./file1/file1\x00', 0x1, 0x3, &(0x7f0000000980)=[{&(0x7f00000007c0)="64249a72dca6b1a7291dea920b78f666cdb7a610ebaa36d85096ad81e6cbc4f89abe3ddd6bcbcc03fc4aa71a70e32c9afb07750f621ac535046f1cd76dd61530df526235a6dcdc24b5aca98f9c91de3f7082a5770ab9183cc74aeb2fa3f737d9304621e52957fe7c888beac96dbb1f64a8a3edb2b713ce40d468b8ba9b82a53575b74fe648982432f020b9f58eb0b9d749ce45d5c4002d1b2b64440f7e06839797671fab1cff54e1cef438e2c59e4baecc83136a94ecdfea49072e16d205bed37d165074751e9c388334845a270f26f25f7442759b3d49a9982aa89c6b16f92a4c2a8b9c", 0xe4, 0x1}, {&(0x7f00000008c0)="6eb622bd40b679d51c7b8a15d3e7897feff0bae734b86fcd773b20ad7a002ebc3874743ac60ed2d3922640d2ce507128d7f8bab5528af1c931ac09821f47d6e3e7bb615d43dda97acb3a349c2c300e2537982442abc95e9bed23fe47d54747eb095ce0bbb8ae223c22be0359fcfae5f3ce041b581b8b1d154a207865837628dafb77cedab26abbdd1dc9550ef5aec2aa496865f6351d6ed9ed", 0x99, 0x6}, {&(0x7f00000003c0)="a53ca266957913407796124784318334cf6d78aba107ee6e5f2d6a95d1d76c848f8a10f5d6", 0x25, 0xfffffffffffffffc}], 0x84800, &(0x7f0000000600)={[{@minixdf='minixdf'}], [{@dont_hash='dont_hash'}, {@smackfshat={'smackfshat', 0x3d, 'overlay\x00'}}]}) 14:54:25 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1060}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:25 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:25 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x8}, 0x0) 14:54:25 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x2000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:25 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x6}, 0x0) 14:54:25 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xa}, 0x0) [ 1288.049865][T31651] overlayfs: filesystem on './file0' not supported as upperdir 14:54:25 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) r1 = semget$private(0x0, 0x3, 0x0) semctl$GETVAL(r1, 0x0, 0xc, &(0x7f0000000500)=""/196) listen(r0, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@local, @in=@initdev}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000480)=0xe8) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r4 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0x2, 0x2) write$ppp(r4, &(0x7f0000000300)="2c17377fe3455ec85661c04afdced1083ac984bb93abf9c7bd53a1abbd8ce60a1a396405a80d87df6e22f238c56101431ee59d320a323df1f2aa73dfe2c7699c7d497abd", 0x44) setsockopt$ARPT_SO_SET_REPLACE(r4, 0x0, 0x60, &(0x7f0000000b40)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000007000000040000005804000058020000000000001801000070030000700300007003000004000000", @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000278a5a3b9e2891f40d00000000000000000000000000000000000000000062854b6e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0001801000000000000000000000000000000000000000000000000000028004155444954000000000000000000000000000000000000000000000000000100000000000000ac1414bbe0000002ff000000ffffffff000000000000000000000000000000000000000000000000ffffff00000000000000000000000000000000000000000000000000000000000000000000000000ff00ff00ff00000000000000000000000003fffe000500040000000276657468305f746f5f687372f5ffffff75657468315f746f5f6873720000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dca3b76af872c186766a374574000000420000000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaa2300000000000000000000aaaaaaaaaaaa00000000000000000000ac14140bac1e01010500000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0001801000000000000000000000000000000000000000000000000000028004e465155455545000000000000000000000000000000000000000000000107000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000193fc4ef0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e800000000000000000000000000000000000000000000000000280000a72b00000000000000000000000000"], 0x4a8) ioctl$sock_SIOCBRADDBR(r3, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) r5 = openat$cgroup_ro(r4, &(0x7f0000000280)='cgroup.controllers\x00', 0x0, 0x0) ioctl$VIDIOC_STREAMOFF(r5, 0x40045613, &(0x7f00000002c0)=0x401) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r0, &(0x7f0000000600)={0x2000}) ioctl$sock_SIOCBRDELBR(r3, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') socket$inet(0x2, 0x0, 0x0) connect$rose(r2, &(0x7f0000000680)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, 0x1, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}, 0x40) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) setsockopt$RDS_GET_MR(r6, 0x114, 0x2, &(0x7f0000000180)={{&(0x7f00000000c0)=""/103, 0x67}, &(0x7f0000000140), 0x41}, 0x20) write$binfmt_script(r0, 0x0, 0x0) ioctl$SIOCRSSL2CALL(r2, 0x89e2, &(0x7f0000000640)=@null) 14:54:25 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:25 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x2500}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:25 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x8}, 0x0) 14:54:25 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xc}, 0x0) 14:54:26 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000600)='./file1/file0/file0\x00', 0x10) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800800}, 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r4}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_setup(0x81, &(0x7f0000000140)=0x0) io_submit(r5, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x1, r3, &(0x7f0000000080)}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="75707047a2f15547cea7142bc4e54d8357ad23de726469723d2e2f66696c65302c6c6f7765726469723d2e3a65302c776f726b6469723d2e2f66696c653166cc6277991213a372797cbdeb3e234687d688c420dc499519c86faa831ae477fe4792f0fc49956310836d778dff11cf1432fb8126d3322d00f54ceb8e0a0601bf733bc77570a79948e996590a3f55dc1a2d95fff23d927d3b0834b0d9d1fcfc937b51d245e7dc000a6e6264475fb4bd61587149e6547337fd30da12d0604cb81c24ad65781845a75c1cc39b28"]) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:26 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xa}, 0x0) 14:54:26 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x3400}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:26 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xe}, 0x0) 14:54:26 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r1, 0x28, &(0x7f00000001c0)}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@getnetconf={0x14, 0x52, 0x100, 0x70bd25, 0x25dfdbff, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000040}, 0x20000000) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:54:26 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x560d}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:26 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xc}, 0x0) 14:54:26 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x10}, 0x0) 14:54:26 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:26 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x8e07}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:26 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xe}, 0x0) 14:54:26 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x60}, 0x0) 14:54:27 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(r1, 0x0, 0x1e7ae842812b967c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x800) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f00000007c0)=ANY=[@ANYBLOB="000000004be977bfb0e3074f4d21c5375e63ae0bf060f3b4f13e9c2e04575e6d7bc4fac17c10c5bd28ba8eb920d81e8cc451e358f379d1a3831c7e8075d5b379b683cc59d7b70852dcf54bf91df73b471b6744dce03856e6cafc3dc67694308a165a22f0126cdf3b756639ecde4234e4422fb6854ebed8e5fb7a42c10bd5363285e0ba973afce01ab658f7b206dee07028ecb92bfbd710c5b511e32d62bbcb4f23e5a9c2ab2c105a18646be4ea9ef1ff6a1ddfd40fa345b43c86ac7fc97de2ceb4b49829db1d", @ANYRES16=0x0, @ANYBLOB="000c29bd7000fddbdf25010000000000000002410000001000137564703a73797a3000000000"], 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) syz_kvm_setup_cpu$x86(r3, r1, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000340)=[@text32={0x20, &(0x7f0000000140)="c4c16d5cc9b92a030000b82b86a7aebafd068a0a0f30c4e2fd21e40f005d05b805000000b9f2e48f4e0f01d90f32ea8100000003010f32640fb0d90f08", 0x3d}], 0x1, 0x20, &(0x7f00000003c0)=[@vmwrite={0x8, 0x0, 0x7fff, 0x0, 0x5c00, 0x0, 0x100, 0x0, 0x1}], 0x1) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000400)='./file0/file1/file0\x00', 0x0, r2) 14:54:27 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f00000000c0)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000140)='bpq0\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x5, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:54:27 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x20002640}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:27 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x1a0}, 0x0) 14:54:27 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x10}, 0x0) 14:54:27 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:54:27 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r2, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r5}, 0x14) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r4, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:27 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x7fffed1e}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x0) 14:54:27 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x300}, 0x0) 14:54:27 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x60}, 0x0) 14:54:27 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0x20000a48}], 0x6}, 0x0) [ 1289.935567][T31802] overlayfs: filesystem on './file0' not supported as upperdir 14:54:27 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x1a0}, 0x0) 14:54:27 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000140)='./file0/file1/file0\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r4}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r3, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:27 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x500}, 0x0) 14:54:28 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0x7fffdd1e}], 0x6}, 0x0) 14:54:28 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) recvmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000100)=""/192, 0xc0}, {&(0x7f00000001c0)=""/30, 0x1e}, {&(0x7f0000000280)=""/159, 0x9f}, {&(0x7f0000000200)=""/31, 0x1f}], 0x4, &(0x7f0000000380)=""/101, 0x65}, 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x3, {{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1d}}}, {{0x2, 0x4e24, @broadcast}}}, 0x108) listen(r0, 0xfffffffffffffffe) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000580)='/proc/capi/capi20ncci\x00', 0x101080, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:54:28 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x600}, 0x0) 14:54:28 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x300}, 0x0) 14:54:28 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r2, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r5}, 0x14) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r4, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:28 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x2}, 0x0) 14:54:28 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xa00}, 0x0) 14:54:28 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x500}, 0x0) [ 1290.823980][T31860] overlayfs: filesystem on './file0' not supported as upperdir 14:54:28 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x3}, 0x0) 14:54:28 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xc00}, 0x0) 14:54:28 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="0ac2280100000000000000421cfffbffffffffffffa7fef7485040ed2f0b4995a5b8f311305038a6344fb1f33398fb59d371e218244b5c8525c7caf6ed4c449700c9bfb2b55fd1acbdcd152e39fb3a5ecdeb6388f79c7e949da4e9156aafd2ddec0d6ee7113167", @ANYRES16=0x0, @ANYBLOB="00082dbd7000fbdbdf25060000000800040003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r4}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r3, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:29 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x191e02, 0x0) ioctl$TIOCSSOFTCAR(r2, 0x541a, &(0x7f00000000c0)=0x7) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:54:29 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x600}, 0x0) 14:54:29 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r2, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r5}, 0x14) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r4, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:29 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x4}, 0x0) 14:54:29 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xe00}, 0x0) 14:54:29 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xa00}, 0x0) 14:54:29 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x5}, 0x0) 14:54:29 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x4000}, 0x0) 14:54:29 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xc00}, 0x0) [ 1292.021423][T31948] overlayfs: filesystem on './file0' not supported as upperdir 14:54:29 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x8}, 0x0) 14:54:29 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x5865}, 0x0) 14:54:30 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xe00}, 0x0) 14:54:30 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x3) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:54:30 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, 0x0, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:30 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') recvmsg$kcm(r1, &(0x7f0000000a00)={&(0x7f00000007c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000840)=""/251, 0xfb}, {&(0x7f0000000940)=""/188, 0xbc}], 0x2, &(0x7f0000000600)=""/30, 0x1e}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000a40)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@initdev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000b80)={@rand_addr, @initdev, 0x0}, &(0x7f0000000bc0)=0xc) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@local, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f00000015c0)=0xe8) ioctl$sock_ifreq(r1, 0x897c, &(0x7f0000001740)={'team_slave_1\x00', @ifru_addrs=@hci={0x1f, 0x0, 0x3}}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001780)={{{@in6=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@empty}}, &(0x7f0000001880)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000001b00)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200004}, 0xc, &(0x7f0000001ac0)={&(0x7f00000018c0)={0x1f4, r2, 0x301, 0x70bd25, 0x25dfdbfe, {}, [{{0x8, 0x1, r3}, {0x44, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r4}}}]}}, {{0x8, 0x1, r5}, {0xb4, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r6}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r7}}}]}}, {{0x8, 0x1, r8}, {0xd0, 0x2, [{0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x3, 0x6, 0x4, 0x20}, {0x9, 0x9, 0xfff, 0xff}, {0x1, 0x1, 0x800, 0x516}, {0x80, 0x0, 0x100000001, 0x1}, {0xff, 0x100000000, 0x9, 0x8f4}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x10000}}}]}}]}, 0x1f4}, 0x1, 0x0, 0x0, 0x40000}, 0xc000) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000c29bd7000fddbdf25010000000000000002410000001000137564703a73797a300000000021bc0e582ac72eb3b0f576249b88d19f3f25f426765dfd76bb1a34a037e789aca4b11b4ff392f2e9cbd12000a261a6f70882ec18b51650c104d7e9ed3457789c7cbf6678c5e2974ceb6827512705fb371acc00f3f15b34f9c04e3a54b68bf89bc89842f83080aee9bee5f640ae22ff99a5b252882ba7f57497c20ab7b95f7510cf125a2069d568a33c8e4d316758a28f28f9c9b662c59d6de08523ef29074f957e018974579f9e5b5dd293509845816ed5d2141372a89479a8335e1ff57436444eb02317"], 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r10, &(0x7f0000000200)={0x11, 0x0, r11}, 0x14) setsockopt$packet_int(r10, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r10, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000d80)=ANY=[@ANYBLOB="75707065726469723d2e2f666d6c65302c6c6f77657264690900000000000000302c776f726b6469723d2e2f66696c653167fa1bf36a1a5d5e8f1b0390514f2ae300196c40f3c4d8d3bedf1c8952b544172072"]) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:30 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0xe}, 0x0) 14:54:30 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x3f00}, 0x0) 14:54:30 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x6000}, 0x0) 14:54:30 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x25}, 0x0) [ 1292.826254][T32021] overlayfs: unrecognized mount option "lowerdi " or missing value 14:54:30 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x4000}, 0x0) 14:54:30 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, 0x0, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:30 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x6558}, 0x0) [ 1293.103319][T32032] overlayfs: unrecognized mount option "lowerdi " or missing value 14:54:30 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x5865}, 0x0) 14:54:31 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) r2 = socket$inet(0x2, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) write$binfmt_script(r2, 0x0, 0x83) 14:54:31 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x34}, 0x0) 14:54:31 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x8100}, 0x0) 14:54:31 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="00082dbd7000fbdbdf25060000000800040003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) socket(0x1, 0xb, 0x0) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r4}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r3, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:31 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x2}, 0x0) 14:54:31 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x1a000}, 0x0) 14:54:31 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, 0x0, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) [ 1294.122454][T32140] overlayfs: filesystem on './file0' not supported as upperdir 14:54:31 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x3}, 0x0) 14:54:31 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x40000) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x78) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:54:31 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x6000}, 0x0) 14:54:32 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x34000}, 0x0) 14:54:32 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x4}, 0x0) 14:54:32 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x6558}, 0x0) 14:54:32 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f00000002c0)=ANY=[@ANYBLOB="6d9d3c89f350b8b7b1ef0a9bd9a29e559b12a28521bd103243d92cf9e0cb7bae8e20551525b38758fc6115a23e47c1ecb029d2152ed42f7041c1293351b5be60dbec51c81a077af238ae3a9e89a8ce9c0585be14ffcb679da56236664a611c164df0fd10b345cc44c675e663ee7c195bb63d2ae86ced", @ANYRES16=0x0, @ANYBLOB="000c29bd7000fddbdf25010000000000000002410000001000137564703a73797a3000000400"], 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r4}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r3, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='overlay\x00', 0xfffffffffffffffe, &(0x7f00000007c0)=ANY=[@ANYRESDEC=r3]) futimesat(r1, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:32 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x400300}, 0x0) 14:54:32 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x5}, 0x0) 14:54:32 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:32 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x8100}, 0x0) 14:54:32 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) recvfrom$unix(r1, &(0x7f0000000100)=""/61, 0x3d, 0x2040, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) r3 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) write$binfmt_script(r0, 0x0, 0x0) 14:54:32 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x1a000}, 0x0) 14:54:32 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x6}, 0x0) 14:54:33 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xa00100}, 0x0) 14:54:33 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000003c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000340)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f00000007c0)=ANY=[@ANYBLOB="ff006b1cb9ed7503b4c4646c5dcceddff740973e99638b3d50532d003b6acf7007b709ac2932a271f1c1765e79e2b2e7a0a520b1074f35357f", @ANYRES16=0x0, @ANYBLOB="000c29bd7000fddbdf25010000000000000002410000001000137564703a73797a3000000000"], 0x2c}}, 0x0) rmdir(&(0x7f0000000140)='./file1/file0\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r4}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r3, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:33 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x8}, 0x0) 14:54:33 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x1000000}, 0x0) 14:54:33 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:33 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xa}, 0x0) 14:54:33 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000005, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x200080, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000000c0)={0x0, 0xc, 0x1}) write$binfmt_script(r0, 0x0, 0x0) 14:54:33 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x2000000}, 0x0) 14:54:33 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x34000}, 0x0) [ 1296.151030][T32289] overlayfs: filesystem on './file0' not supported as upperdir 14:54:34 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xc}, 0x0) 14:54:34 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000140)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000340)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00fddbdf250100a600000000008b8a0e6c07aa878a1eec09801efe37bf64703a73797a30000000000000000000"], 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r4}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r3, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:34 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x400300}, 0x0) 14:54:34 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x3000000}, 0x0) 14:54:34 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x401, 0x244000) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f0000000b40)={0x0, 0x0, 0x2080}) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:54:34 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xe}, 0x0) 14:54:34 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xa00100}, 0x0) 14:54:34 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:34 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x4000000}, 0x0) 14:54:34 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x10}, 0x0) 14:54:34 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x1000000}, 0x0) 14:54:34 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x5000000}, 0x0) [ 1297.143382][T32340] overlayfs: filesystem on './file0' not supported as upperdir 14:54:35 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c6382bf916528b29d0412c66a4166db6d", @ANYRES16=0x0, @ANYBLOB="00082dbd7000fbdbdf25060000000800040003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000980)=ANY=[@ANYBLOB="2c900a550f0cfccd0675ffe7daf16cb699ef322c7aeb8f877d07f0d02528aa51ca7a7afb3bc03c75ff7f51af7e425daf51f2b689d3054eaf845104b600eb91b30610f5fcc2ea683ac2b336a2f0be3848dea913ab91a694fde2977fa37a0e46d3f7e9a2b8c5cecb02d1c9b031ba4260467bc3c1857e1ee574f0e1f74d38952725f3f9585f3f3793e757272759a54cc055a2aec22dff2b2df2653331b615deb2fb19cd1d131b5a59aa880a2828e44f84578eec4a47f65616b3f6d4fa6195b66adbfeaff23865d346fbca8151a7c3947a018f949989a97fa8395ced39ed67017eaa052feb6e925f509251655f", @ANYRES16=0x0, @ANYBLOB="000c29bd6feafddbdfc2c26772476e42601b024545250100000000000000137564703a730000"], 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f00000002c0)={0x11, 0x10, r5, 0x1, 0x7, 0x6, @random="7c8fa862ead6"}, 0x1d4) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000340)={0x8, 0x6, 0xffffffffffffffc0, 0x4}) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r4, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="757036f3dc77bf5d527065726469fa14000000000000302c6c6f7765726469c462f64420b53a36302c776f726b64698f3dd4d40e8d6c6531d15c30dbf3b6c2e62ec61c07738aab8bc3e7588a3c66af790014a25b69479905162f0ede346104d1"]) lchown(&(0x7f0000000000)='./file1/file0\x00', 0x0, 0x0) setsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f00000003c0), 0x4) 14:54:35 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) r2 = request_key(&(0x7f0000000080)='id_legacy\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00', 0xfffffffffffffff8) r3 = add_key(&(0x7f0000000140)='rxrpc_s\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000b40)="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", 0x1000, 0xfffffffffffffffb) keyctl$negate(0xd, r2, 0x3, r3) socket$inet(0x2, 0x0, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x105400, 0x0) execveat(r4, &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000280)='vboxnet1\x00', &(0x7f00000002c0)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00', &(0x7f0000000300)='rxrpc_s\x00', &(0x7f0000000340)='ppp0mime_typevmnet1system)vmnet1{\x00', &(0x7f0000000380)='selfvmnet0vmnet0\x00', &(0x7f00000003c0)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00'], &(0x7f0000000640)=[&(0x7f0000000440)='\x00', &(0x7f0000000480)='syz', &(0x7f00000004c0)='syz', &(0x7f0000000500)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00', &(0x7f0000000540)='\'security\x00', &(0x7f0000000580)='bcsf0\x00', &(0x7f00000005c0)='-lovmnet1-,\x00', &(0x7f0000000600)='\x00'], 0x1100) write$binfmt_script(r0, 0x0, 0x0) 14:54:35 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x2000000}, 0x0) 14:54:35 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x6000000}, 0x0) 14:54:35 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x60}, 0x0) 14:54:35 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:35 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x8000000}, 0x0) 14:54:35 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x1a0}, 0x0) 14:54:35 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x3000000}, 0x0) 14:54:35 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xa000000}, 0x0) 14:54:35 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x300}, 0x0) 14:54:35 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000780)={&(0x7f00000005c0), 0x7, &(0x7f00000006c0)={&(0x7f00000007c0)={0xfffffffffffffd29, 0x0, 0x800, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x0, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID, @IPVS_DAEMON_ATTR_MCAST_IFN={0x0, 0x2, 'bond0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x0, 0x4, 0x5cc}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x0, 0x6, 0x8001}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x0, 0x4, 0x3f}, @IPVS_CMD_ATTR_SERVICE={0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x0, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x0, 0x4, 0x4e22}, @IPVS_SVC_ATTR_FWMARK={0x0, 0x5, 0x4}]}, @IPVS_CMD_ATTR_SERVICE={0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x0, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PE_NAME={0x0, 0xb, 'sip\x00'}]}]}, 0x2e1}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r4}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r3, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:35 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x4000000}, 0x0) 14:54:35 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:35 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = open(&(0x7f0000000080)='./file0\x00', 0x800, 0x43) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000140)) ioctl$VIDIOC_QUERYCTRL(r2, 0xc0445624, &(0x7f00000000c0)={0x1, 0xf, "25c2bc76e5f5e10de60c1ea7ac805ddef17205ef13dc08d8ced11b29d79d1e78", 0x80000001, 0x7, 0x1, 0xf5d, 0x110}) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) r3 = socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r3, 0x0, 0xfffffffffffffee8) 14:54:36 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xc000000}, 0x0) 14:54:36 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x5000000}, 0x0) 14:54:36 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x500}, 0x0) 14:54:36 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x6000000}, 0x0) 14:54:36 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xe000000}, 0x0) [ 1298.747544][T32508] overlayfs: filesystem on './file0' not supported as upperdir 14:54:36 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:36 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x600}, 0x0) 14:54:36 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='teql0\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:54:36 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x15, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x10}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r4}, 0x14) write$P9_RREADDIR(r1, &(0x7f00000007c0)={0xf2, 0x29, 0x1, {0x80, [{{0x14, 0x3, 0x7}, 0x5, 0x9, 0x5, './bus'}, {{0xc9, 0x0, 0x3}, 0x7, 0x401, 0x13, './file0/file1/file0'}, {{0x2, 0x4, 0x6}, 0x800, 0x0, 0x13, './file0/file1/file0'}, {{0x40, 0x1, 0x6}, 0x4, 0x3, 0x5, './bus'}, {{0x10, 0x1, 0x8}, 0x9, 0xffffffffffff7fd3, 0x5, './bus'}, {{0xe3, 0x1, 0x8}, 0x7, 0x400, 0x5, './bus'}, {{0x4, 0x3, 0x7}, 0x0, 0x4, 0x5, './bus'}]}}, 0xf2) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r3, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) 14:54:36 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x10000000}, 0x0) 14:54:36 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x8000000}, 0x0) 14:54:37 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xa00}, 0x0) 14:54:37 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xa000000}, 0x0) 14:54:37 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x40000000}, 0x0) 14:54:37 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={0x0}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:37 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xc000000}, 0x0) 14:54:37 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x4000, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f00000000c0)={0x1, {{0x2, 0x4e22, @local}}}, 0x88) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:54:37 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xc00}, 0x0) 14:54:37 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x60000000}, 0x0) 14:54:37 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xe00}, 0x0) 14:54:37 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xe000000}, 0x0) 14:54:37 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x65580000}, 0x0) 14:54:38 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="1c004000", @ANYRES16=0x0, @ANYBLOB="00082dbd7000fbdbdf25060000000800040003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)=ANY=[@ANYBLOB="7f2c0000", @ANYRES16=0x0, @ANYBLOB="000c29bd7000fddbdf25010000000000000002410000001000137564703a73797a3000000000"], 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r5}, 0x14) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) write$P9_RREMOVE(r2, &(0x7f0000000140)={0x7, 0x7b, 0x2}, 0x7) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r4, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:38 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r0}) listen(r0, 0xfffffeffffffff9e) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) listen(r1, 0x5) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000180)='if\x98gr\x820\x00\x00\x00\x00\x80\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x202100, 0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:54:38 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x3f00}, 0x0) 14:54:38 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={0x0}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:38 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x81000000}, 0x0) 14:54:38 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x10000000}, 0x0) 14:54:38 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x4000}, 0x0) 14:54:38 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x88a8ffff}, 0x0) 14:54:38 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x3f000000}, 0x0) [ 1300.799030][T32694] overlayfs: filesystem on './file0' not supported as upperdir 14:54:38 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x5865}, 0x0) 14:54:38 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) write$binfmt_elf32(r1, &(0x7f0000000b40)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x9, 0x9, 0xfffffffffffffffb, 0x1, 0x0, 0x3f, 0x1, 0xdd, 0x38, 0x220, 0x0, 0x6, 0x20, 0x2, 0x8, 0x2, 0x200}, [{0x7474e551, 0x80, 0xad, 0x5, 0x3, 0x5, 0x0, 0x1}], "ec5c21881fe896a334ab19e8", [[], [], [], [], [], [], [], []]}, 0x864) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:54:38 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={0x0}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:38 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, &(0x7f00000007c0)={0xfff, 0x2, 'client0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe9\xff\x00', 0x4, "4d39b000fd7cf746", "aef72351870817d5cfa8a2496868cf289d13e590b76bb00651c4096e788f689c", 0xa4c6000000000, 0x400}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r5}, 0x14) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r4, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:38 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xa0010000}, 0x0) 14:54:38 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x6000}, 0x0) 14:54:38 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x40000000}, 0x0) 14:54:39 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xc3ffffff}, 0x0) 14:54:39 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x60000000}, 0x0) 14:54:39 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x6558}, 0x0) 14:54:39 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, &(0x7f0000000b40)=""/4096) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:54:39 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xffffa888}, 0x0) 14:54:39 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x8100}, 0x0) 14:54:39 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x65580000}, 0x0) 14:54:39 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x0, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) [ 1301.882544][ T323] overlayfs: filesystem on './file0' not supported as upperdir 14:54:39 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="00082dbd7000fbdbdf25060000000800040003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r4}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r3, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:39 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xffffffc3}, 0x0) 14:54:39 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x1a000}, 0x0) 14:54:39 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x81000000}, 0x0) 14:54:40 executing program 3: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast1}, &(0x7f00000002c0)=0x10, 0x80800) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r1, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) r3 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x0, 0x100) getsockopt$packet_buf(r3, 0x107, 0x6, &(0x7f0000000180)=""/155, &(0x7f0000000280)=0x9b) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x0) 14:54:40 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x1a0ffffffff}, 0x0) 14:54:40 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x34000}, 0x0) 14:54:40 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x40030000000000}, 0x0) 14:54:40 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x400300}, 0x0) 14:54:40 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x0, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) [ 1302.936288][ T391] overlayfs: filesystem on './file0' not supported as upperdir 14:54:40 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xa0010000000000}, 0x0) 14:54:40 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) r2 = socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r3 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0xaf, 0x400) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f00000000c0)={0x0, 0xff, "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"}, &(0x7f0000000200)=0x107) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000280)={r4, @in6={{0xa, 0x4e22, 0x881, @mcast1, 0x100}}, 0x4, 0xfffffffffffffffd}, 0x90) 14:54:41 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r4}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r3, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707206726469723d2e2f66696c65302c6c6f7765726469723d2e3a66696c653100000000000000000000000000000000"]) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:41 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xa00100}, 0x0) 14:54:41 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x88a8ffff}, 0x0) 14:54:41 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x100000000000000}, 0x0) 14:54:41 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x0, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:41 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x1000000}, 0x0) 14:54:41 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xa0010000}, 0x0) [ 1303.668017][ T455] overlayfs: unrecognized mount option "uprrdir=./file0" or missing value 14:54:41 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x200000000000000}, 0x0) [ 1303.877694][ T455] overlayfs: unrecognized mount option "uprrdir=./file0" or missing value 14:54:41 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xc3ffffff}, 0x0) 14:54:41 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x2000000}, 0x0) 14:54:41 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) r0 = accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r1, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(r0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r5}, 0x14) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r4, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:42 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x400000, 0x0) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f0000000140)={0x9, 0xfffffffffffffff7, 0xdc94, 0x5, 0x400, 0x800}) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000180)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r2, 0xc010641d, &(0x7f00000001c0)={r3, &(0x7f0000000b40)=""/4096}) mkdirat(r2, &(0x7f0000000200)='./file0\x00', 0x20) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x8200, 0x0) setsockopt$RDS_RECVERR(r4, 0x114, 0x5, &(0x7f00000000c0)=0xfffffffffffffffd, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:54:42 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xffffa888}, 0x0) 14:54:42 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x300000000000000}, 0x0) 14:54:42 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x3000000}, 0x0) 14:54:42 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:42 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xffffffc3}, 0x0) 14:54:42 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x400000000000000}, 0x0) 14:54:42 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x4000000}, 0x0) 14:54:42 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x1a0ffffffff}, 0x0) 14:54:42 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x500000000000000}, 0x0) [ 1305.046232][ T533] overlayfs: filesystem on './file0' not supported as upperdir 14:54:43 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x40030000000000}, 0x0) 14:54:43 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_NMI(r1, 0xae9a) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$int_in(r2, 0x5452, &(0x7f00000000c0)=0xfff) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25DELUID(r1, 0x89e2, &(0x7f00000001c0)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r3}) socket$inet(0x2, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000200)={@dev={0xfe, 0x80, [], 0x20}, 0x7b, 0x1, 0x3, 0x2, 0x1, 0x1}, 0x20) write$binfmt_script(r0, 0x0, 0x0) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f0000000280)={0x0, 0x101, 0x4, {0xfffffffffffff75c, 0x1f, 0x7d0b, 0x6}}) 14:54:43 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x5000000}, 0x0) 14:54:43 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000600)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r0 = syz_open_dev$adsp(&(0x7f00000003c0)='/dev/adsp#\x00', 0x1, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000009c0)) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=ANY=[@ANYBLOB='\x00\x00@\x00', @ANYRES16=0x0, @ANYBLOB="00082dbd7000fbdbdf25060000000800040003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f00000007c0)=ANY=[@ANYBLOB="02e403d140595cff5ecbf6ef6c712eb3718110c0000000000000000000", @ANYRES16=0x0, @ANYBLOB="000c29bd7000fddbdf25010000000000000002410000001000137564703a73797a3000000000"], 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r4}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000140)=0x80000000) io_setup(0x0, &(0x7f0000000340)=0x0) io_submit(r5, 0x1, &(0x7f0000000180)=[&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x100000000001, 0x40000000000000, r3, &(0x7f0000000280)="bd6206f5e2ee6b8ad396", 0xa}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:43 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x600000000000000}, 0x0) 14:54:43 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:43 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x6000000}, 0x0) 14:54:43 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x800000000000000}, 0x0) 14:54:43 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xa0010000000000}, 0x0) 14:54:43 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x8000000}, 0x0) 14:54:43 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xa00000000000000}, 0x0) 14:54:43 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:43 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @default, @default, @netrom, @null, @rose]}, 0x38b) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000740)='vxcan1\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x62a, 0x40) ioctl$KVM_GET_MSR_INDEX_LIST(r2, 0xc004ae02, &(0x7f00000000c0)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) write$binfmt_script(r0, 0x0, 0x0) 14:54:43 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x100000000000000}, 0x0) 14:54:44 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xa000000}, 0x0) [ 1306.284296][ T667] overlayfs: filesystem on './file0' not supported as upperdir 14:54:44 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') r1 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x40, 0x410042) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f0000000880)={0x0, "e20774e2975a9fba4499663462027c3545012b4e4496e3b9a507e33674633f10", 0x1440, 0x5, 0x8, 0x2, 0x3}) setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="203ef6c1be240cdbb826e3f208adc772e97bcf3ba524c918c1ecbd658d8b7cb1cde580c72fed5852501f6c3be4fa5afb723764dfed53368bdb7ac080a7a45063f457724d98c35e63c66ec4991ccac0b58995952a4e4b4837d518bbaf016d46723fdb66736c14137773c6b42b83d0df306b701ccd64cf0b0952cf4b02844b664fb4", @ANYRES16=0x0, @ANYBLOB="00082dbd7000fbdbdf25060000000800040003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r5}, 0x14) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r4, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:44 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x200000000000000}, 0x0) 14:54:44 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xc000000}, 0x0) 14:54:44 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x7, 0x10000, 0xfffffffffffffff7, 0x6, 0xfffffffffffffffa, 0x5, 0x10001, {0x0, @in6={{0xa, 0x4e22, 0x429cfaa1, @empty, 0x9}}, 0x380000000000, 0x0, 0x100000000, 0x40}}, &(0x7f00000001c0)=0xb0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000200)={r2, 0x10001}, &(0x7f0000000280)=0x8) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r3, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r4, 0x0, 0x48a, &(0x7f0000000080)={0x101, 0xbba6, 0x5}, 0xc) ioctl$sock_SIOCBRDELBR(r3, 0x89a1, &(0x7f00000002c0)='caif0\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:54:44 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x300000000000000}, 0x0) 14:54:44 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xe000000}, 0x0) 14:54:44 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:44 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xc00000000000000}, 0x0) 14:54:44 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x400000000000000}, 0x0) 14:54:44 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x10000000}, 0x0) [ 1307.172520][ T703] overlayfs: filesystem on './file0' not supported as upperdir 14:54:45 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r4}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r3, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0\flowerdir=.:file0,wzrkdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:45 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x500000000000000}, 0x0) 14:54:45 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x2, 0x4000004) write$binfmt_script(r0, 0x0, 0x0) 14:54:45 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x3f000000}, 0x0) 14:54:45 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x600000000000000}, 0x0) 14:54:45 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:45 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x40000000}, 0x0) 14:54:45 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x800000000000000}, 0x0) [ 1307.772695][ T765] overlayfs: unrecognized mount option "wzrkdir=./file1" or missing value [ 1307.920312][ T788] overlayfs: unrecognized mount option "wzrkdir=./file1" or missing value 14:54:45 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000400)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80800000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000228bd7000fedbdf25010000000800060002000000080003000500000008000300010400000800030009000000140001000000000000000000000000000000000108000500020000000800030006030000080006000100000008000600030000000800060001000000"], 0x70}, 0x1, 0x0, 0x0, 0x20000080}, 0x14) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) r4 = socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) getsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f00000000c0)={@local, @remote, 0x0}, &(0x7f0000000100)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000140)={{{@in, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@empty, 0x4e22, 0x0, 0x4e24, 0x3f31, 0xa, 0x80, 0x20, 0x7f, r5, r6}, {0x800, 0x5cc, 0x8001, 0x11b, 0x6, 0x5, 0x7fff, 0x9}, {0xfffffffffffffffc, 0xfffffffffffffff7, 0x1, 0xff}, 0x2, 0x0, 0x3, 0x0, 0x3, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d3, 0x7f}, 0xa, @in=@remote, 0x0, 0x0, 0x2, 0x103, 0x80000000, 0x8, 0xa}}, 0xe8) 14:54:45 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xe00000000000000}, 0x0) 14:54:45 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x60000000}, 0x0) 14:54:45 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xa00000000000000}, 0x0) 14:54:45 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x80000, 0x100) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r4}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r3, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:45 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:45 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x65580000}, 0x0) 14:54:46 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xc00000000000000}, 0x0) 14:54:46 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x1000000000000000}, 0x0) 14:54:46 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x81000000}, 0x0) [ 1308.540857][ T860] overlayfs: filesystem on './file0' not supported as upperdir 14:54:46 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xe00000000000000}, 0x0) 14:54:46 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x4000000000000000}, 0x0) 14:54:46 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x5, 0x8000) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f00000000c0)={0x2, [0x4, 0x1, 0x100, 0xfffffffffffffffe, 0x400, 0x17, 0x8000, 0x5, 0x1f, 0x6, 0x1f, 0x7ff, 0x2, 0x80000001, 0x20, 0x8, 0x1, 0x5, 0xfffffffffffffffb, 0xa92d, 0x2, 0xffff, 0x6, 0x7fff, 0x1000, 0xde98, 0x100000000, 0x8, 0x0, 0xa44, 0x3, 0x8, 0x5875, 0x1, 0x6, 0x8, 0x5, 0x10001, 0x9, 0x2, 0x3, 0x2, 0x7fff, 0x7, 0xffff, 0xcdf, 0x3280000000000000, 0x2800000000000000], 0xa}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r1, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) utime(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x6}) write$binfmt_script(r1, 0x0, 0x0) 14:54:46 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x29, 0x0, 0x8, {0x7, 0x1c, 0xfffffffffffffffe, 0x13810, 0x3, 0x2, 0x4, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r5}, 0x14) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r4, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000140)='./file0/file1/file0\x00', r2, 0x0) 14:54:46 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x88a8ffff}, 0x0) 14:54:46 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x1000000000000000}, 0x0) 14:54:46 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:46 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x6000000000000000}, 0x0) 14:54:46 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x6558000000000000}, 0x0) 14:54:46 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x3f00000000000000}, 0x0) 14:54:46 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xa0010000}, 0x0) 14:54:47 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xc3ffffff}, 0x0) 14:54:47 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) keyctl$set_reqkey_keyring(0xe, 0x7) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f0000000080)=0x9) write$binfmt_script(r0, 0x0, 0x0) 14:54:47 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x8100000000000000}, 0x0) 14:54:47 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x4000000000000000}, 0x0) [ 1309.644531][ T923] overlayfs: filesystem on './file0' not supported as upperdir 14:54:47 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00082dbd708cff9d0e7365dad9db1fcfc812247b00fbdbdf25060000fa0700040003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000c29bd7000fddbdf250100000000000000024100000010001375ebd5ff73797a3000000000"], 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)) r2 = socket(0x200000000000011, 0x3, 0x0) bind$packet(r2, &(0x7f0000000200), 0x14) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000140)={0x2, 0x4, 0x5, 0x1, 0x0}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000003c0)={r3, 0x183b00000}, &(0x7f0000000600)=0x8) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r2, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:47 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:47 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xffffa888}, 0x0) 14:54:47 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x88a8ffff00000000}, 0x0) 14:54:47 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x6000000000000000}, 0x0) 14:54:47 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xffffffc3}, 0x0) 14:54:48 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xc3ffffff00000000}, 0x0) 14:54:48 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x6558000000000000}, 0x0) 14:54:48 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) dup2(r0, r0) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r1}) fsetxattr$security_evm(r0, &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@v1={0x2, "839ed304fea54e2b3de36cd4633551"}, 0x10, 0x0) syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) r2 = dup3(r1, r0, 0x80000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000200)={0x40000000}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000000c0)={[0x0, 0x6, 0x1, 0x40, 0x100, 0x6, 0x5, 0x0, 0x80000001, 0x4, 0x1f, 0x4, 0x9, 0x8, 0x101, 0x4], 0x2, 0x40010}) 14:54:48 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:48 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x8100000000000000}, 0x0) 14:54:48 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xffffffffa0010000}, 0x0) [ 1310.588029][ T1031] overlayfs: filesystem on './file0' not supported as upperdir 14:54:48 executing program 2: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) r0 = accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r1, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000840)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000a00000/0x600000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000d7d000/0x2000)=nil, &(0x7f0000e6d000/0x2000)=nil, &(0x7f0000d57000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000d2f000/0x3000)=nil, &(0x7f0000d60000/0x1000)=nil, &(0x7f00000007c0)="e2a9df044229af6aacbe4f3748551f3d6fd85f7e78f8f6e9be743c91923a11fb6b1cf1e72fa060bfd65fd61d755d4ee44a65fe6581abac7cc1afb102986298ec0d149ecf58963f13e0a5560ee48eb51100e48ab94f8417b6a470a99ecc9522fc81ff9e8338dc11a9a7ac", 0x6a, r0}, 0x68) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f00000008c0)=ANY=[@ANYBLOB="2c000002f65db32190d412d13219f8b1d60efb34b2201e6866117b8878514ca2d3fb4ce204b89522e959efa99b9ae6b7125073e438b4e806b26d757f0a2053edb279e73e8bb3c82b65015a9dadb9bdebf7660d4d39c2e916329de99c66c278f12f6ec51524b928d69f34664769f7215dd3018a6d3d579adcc25c27", @ANYRES16=0x0, @ANYBLOB="000c29bd7000fddbdf25010000000000000002410000001000137564703a73797a3000000000"], 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r5}, 0x14) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r4, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:48 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:48 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x1a0ffffffff}, 0x0) 14:54:48 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x88a8ffff00000000}, 0x0) 14:54:48 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xc3ffffff00000000}, 0x0) 14:54:48 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x40030000000000}, 0x0) 14:54:48 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') shutdown(r0, 0x1) syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:54:48 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:48 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:49 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xffffffff00000000}, 0x0) 14:54:49 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:49 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xffffffffa0010000}, 0x0) [ 1311.830972][ T1116] overlayfs: filesystem on './file0' not supported as upperdir 14:54:49 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) r0 = accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r1, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) r3 = fcntl$getown(r0, 0x9) fcntl$lock(r0, 0x24, &(0x7f0000000140)={0x0, 0x7, 0x1, 0x400, r3}) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:49 executing program 3: r0 = syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0x0, 0x2) ioctl$VT_ACTIVATE(r0, 0x5606, 0x8) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) r2 = accept4(r1, &(0x7f0000000080)=@nl=@unspec, &(0x7f0000000100)=0x80, 0x80000) setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f0000000140)={{0xf66a291fdae968cd, @multicast1, 0x4e21, 0x1, 'dh\x00', 0x2, 0xff, 0x4f}, {@loopback, 0x4e21, 0x1, 0x101, 0x9f, 0x1000}}, 0x44) listen(r1, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000200)={0x1f, 0x9, {0x1, 0x3, 0x9, 0x9, 0xf6, 0x570}, 0x8001, 0x8}, 0xe) ioctl$sock_SIOCBRADDBR(r3, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r3, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x0) 14:54:49 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:49 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:49 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:49 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xa0010000000000}, 0x0) 14:54:50 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:50 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:50 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x100000000000000}, 0x0) 14:54:50 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:50 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:50 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:50 executing program 2: mkdir(&(0x7f0000000240)='./file0/file1/file0\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f00000007c0)='./file0/file1/file0\x00', &(0x7f00000003c0)='./file0/file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x200000000000011, 0x3, 0x0) write$P9_RLOPEN(r1, &(0x7f0000000140)={0x18, 0xd, 0x1, {{0x0, 0x4, 0x6}, 0x3}}, 0x18) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r4}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r3, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:50 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000080)='bridg\t\x01s|ave_0\x00') acct(0x0) syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000200)=0xfffffffffffffe19) 14:54:50 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x200000000000000}, 0x0) 14:54:50 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:51 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x300000000000000}, 0x0) 14:54:51 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:51 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) [ 1313.490231][ T1266] overlayfs: missing 'lowerdir' 14:54:51 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x800, 0x100) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) listen(r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) [ 1313.663968][ T1288] overlayfs: missing 'lowerdir' 14:54:51 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x400000000000000}, 0x0) 14:54:51 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:51 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:51 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$unix(r1, &(0x7f00000003c0)={&(0x7f00000007c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000340)=[{&(0x7f0000000840)="c1ec2c3128eb7aff9507caa5ed1a383e4701bc1d56b8f7ab2be0f284dc4b2d2898a02e7b14c2e4b64306259805d4f8700d50216191c208d1bfbf510ba48adc2c993cbb0836e496d40f7959db7763161e4581e76e734e28d4872c76f6518b710e089adbc19cac8ff9bb450a99568d11193f059134c5ba7ea546b64ef88e494f92742304a8f0ba4277859b9171992bd4d4e6e9cfd0d761240dfb290d9e3e2d91acc79f2173fc5a417a2fc32752e7b38ecf1a740c56cf99173a511f8ce0b9bbd865ce2e59439ad825c4c99e2e46f66a377c4ac8c4f17afead571aed0727392f7746c4221af8c1151694c3eaf49205ba48a848551c0ecd9c", 0xf6}, {&(0x7f0000000940)="4b9d4e61249647f53160ec6e5fd1207075b4623a4ffe9ff62e56f81dfb3f5ee4ea63d4badd2aa1b667999bbc498a2ed6638168350c5977a035531f247eeb573355003331efac2988305273bb473bc2e76bc26d1ec03989393a590e14640b82aebe09c1f225d6050a30bda7b4486b0d935ae8a3bc131296b40a", 0x79}, {&(0x7f0000000140)="7ef44a3c", 0x4}], 0x3, 0x0, 0x0, 0x4}, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000600)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000c29bd7000fddbdf2501000000000000e801410000001000130200000073797a30000000d45f2d5b5200"], 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r4}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r3, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:51 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:51 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:51 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:51 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x500000000000000}, 0x0) 14:54:52 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x10000, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f00000000c0)) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x4200, 0x0) 14:54:52 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) [ 1314.430259][ T1333] overlayfs: filesystem on './file0' not supported as upperdir 14:54:52 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:52 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x600000000000000}, 0x0) 14:54:52 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:52 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x800ff) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r4}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) syz_open_dev$media(&(0x7f0000000340)='/dev/media#\x00', 0x100, 0x200001) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r3, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:52 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:52 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:52 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x800000000000000}, 0x0) 14:54:52 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:52 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xa00000000000000}, 0x0) 14:54:52 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x100000000e) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:54:53 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:53 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:53 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) [ 1315.385273][ T1440] overlayfs: filesystem on './file0' not supported as upperdir 14:54:53 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xc00000000000000}, 0x0) 14:54:53 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:53 executing program 2: mkdir(&(0x7f0000000340)='./file1/file0\x00', 0xfffffffffffffffe) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f00000003c0)='/dev/adsp#\x00', 0x0, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0xe0, 0x1) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r4}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r3, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:53 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:53 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xe00000000000000}, 0x0) 14:54:53 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:53 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:53 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/205, 0xcd}, {&(0x7f0000000180)=""/11, 0xb}, {&(0x7f00000001c0)=""/29, 0x1d}, {&(0x7f0000000280)=""/79, 0x4f}], 0x4, 0x0) syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:54:53 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x1000000000000000}, 0x0) 14:54:53 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:54 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) [ 1316.265962][ T1487] overlayfs: failed to resolve './file1': -2 [ 1316.431652][ T1522] overlayfs: failed to resolve './file1': -2 14:54:54 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:54 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x3f00000000000000}, 0x0) 14:54:54 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0xfffffffffd7ffffa) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00092dbd7000fb398d20460000000800040003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) sendmsg$tipc(r2, &(0x7f00000003c0)={&(0x7f0000000140)=@id={0x1e, 0x3, 0x3, {0x4e20}}, 0x10, &(0x7f0000000340)=[{&(0x7f00000007c0)="61e6981e674e4fc2b4668f308d56e88a64254b7aa93410518a7b6f7ae7e7604decafd6907170b57d051418af358a0970adb0093a6b28a0ddc7e31502a0c162077a3db81a9e7cfe33ac1b085ff54723f8", 0x50}, {&(0x7f0000000840)="85a11c47f81a62d5ddd5fe5fca12081cf6729cee5c911186c09b83e687b8244765e2803dd66b8b4219b20b4cf3c3fb6aa1df47eda105978ed73acd44e801a2840ae439acbf7e1c205c4cae88cd9c6bb6465d0e51cea0317bbed7e2932cc5b229a058adf5f510355de6604896866e74453134721271ee28832e895fe6761ea438c977df64d8b80fc0511a6d4a3ad908fe07b204ad29cc5d8a7d39ed488bed4c1ed406cc1a86a0630b5ce9dbcafa70ee14d14861dcdf8a03abf1ff40688e51951888cb91d67f152721d66b4f3d544cd1440cb3336e4aab9890d4866a951f56ada2fb67777ae6", 0xe5}, {&(0x7f0000000940)="611a431d6458516c1d4c02ddab3b18e794f7eafdb09bc4ac955c100e03301aa08d88bf593d9e5ad2edfbb7ebba31b0b3e72ea992332a3f646e656dbb9501f21e3b42dfbaa03f671e61fd256c5f4fc19c0ac0747bf0545189cc600c62d4e4aa0e30b47ce9503e3df50eddb94f67a4a1aea7367a2e1f5167097e4fd0d0937c00a8f1a9358d1935fd03fc168ff80d3bcfa5ee0290e440095dc5bd04606c53302d4b152152d4a9416db10ca708043c5e3c36aa1049db6ffbb52d900eb8e0ed2a8b8715f678abd37a5d2d85", 0xc9}, {&(0x7f0000000a40)="562272adbe2f8655ad39e7dadf9b6533f6951dcec95e2ac1be65f676b0f671e9f9d107706eb03175e3170584a9c3aea8d3b62d931e3827f40e834c89cd5f857e42344e0b7655b232a3431d405559f639c031ad2dd0c92f3b5e9734e313e3abd3c269bf4b2ee37149bd63e9d47c220b097636a12b9bce8ff67ee300cfd6df1beac0aa19a153c54c50675049a2898a9e02334365c33ccb227bf62e0c6b27495e3f0eefec090477d875535524c3962a25b169c9797f83a6954540276e5d7b1b3e2c61a4", 0xc2}], 0x4, 0x0, 0x0, 0x20004090}, 0x1) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r5}, 0x14) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r4, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:54 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:54 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x4000000000000000}, 0x0) 14:54:54 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xff27) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x21, &(0x7f0000000000)=0xffffffffffffffff, 0x4) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0xf}}, 0x1c) getpeername(r1, 0x0, &(0x7f00000000c0)) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r2, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r2, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r3, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r3, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r2, 0x0, 0x0) 14:54:54 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:54 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:54 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x6000000000000000}, 0x0) 14:54:55 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) [ 1317.370352][ T1596] overlayfs: filesystem on './file0' not supported as upperdir 14:54:55 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:55 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x6558000000000000}, 0x0) 14:54:55 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:55 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) r0 = accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r1, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x2) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x100) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') r2 = dup3(r0, r1, 0x80000) mq_timedsend(r2, &(0x7f0000000140)="d64bc577954554c882587e998358991778dab1fc8a9f6086801ea64a5ff78aa57185a3fe8533facfd38b7f580d06c60dc3217f190e52add6221e", 0x3a, 0x8, &(0x7f0000000340)) setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r3, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000c29bd7000fd0012410000001000137564703a73797a300000000000000000000000000000"], 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="7570a74a8e22d35bef572f66696c653017fa363a65726469723d2e3a66696c65302c776f726b6469723d2e2f66696c653156b40ec676b20564ae4c2c85fc374d5a01256c737abc97e2b1a9b9bc67ee8b684a3d4c2b7029907a92c4d11614ad2812bf4d16dfe31a7d61ad2c38c96f7f8cddc3e9d6d32d53c33e03232f30fcae5bde5f0ae9b3b5253588a8cb753fd7f9c53f"]) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:55 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0x66, 0x1c, &(0x7f0000000080)="2e9260eb5d53628cd5535759b43202576dac269517acb76936dca415c4acf9b2c4af092b4cac310aca134c245732ad55d7fbd9119b54f0f3f56982d0ff9706894dc3deef26092784a5cbcd870c6295baae12b975633fdc3eaa463bf58fd9479945ffa6db037b", &(0x7f0000000100)=""/28, 0x7}, 0x28) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') r2 = syz_genetlink_get_family_id$team(0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x4000, 0x0) accept4$packet(r1, &(0x7f0000000300)={0x11, 0x0, 0x0}, &(0x7f0000000340)=0x14, 0x80800) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)={@mcast2, 0x0}, &(0x7f00000003c0)=0x14) r6 = accept$packet(0xffffffffffffff9c, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000440)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000880)={'team0\x00', 0x0}) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000180)=0x1, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000008c0)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000900)={'vcan0\x00', 0x0}) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f00000001c0)=0x0) r12 = getpgid(0xffffffffffffffff) tgkill(r11, r12, 0x33) sendmsg$TEAM_CMD_NOOP(r3, &(0x7f0000000980)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000940)={&(0x7f0000000b40)=ANY=[@ANYBLOB="04020000", @ANYRES16=r2, @ANYBLOB="04032bbd7000ffdbdf250000000008000100", @ANYRES32=r4, @ANYBLOB="4400020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB="080007000000000008000100", @ANYRES32=r7, @ANYBLOB="9c0102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r8, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400090000e1a83f7ea3c37ac3006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400a301000038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400010000003c00010024000100018000000000000000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000180000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004002eb3000008000600", @ANYRES32=r10], 0x204}, 0x1, 0x0, 0x0, 0xc000}, 0x4000000) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:54:55 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:55 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:55 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x8100000000000000}, 0x0) 14:54:55 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:55 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) [ 1318.257992][ T1661] overlayfs: unrecognized mount option "up§JŽ"Ó[ïW/file0ú6:erdir=.:file0" or missing value 14:54:56 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x88a8ffff00000000}, 0x0) 14:54:56 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) [ 1318.506500][ T1661] overlayfs: unrecognized mount option "up§JŽ"Ó[ïW/file0ú6:erdir=.:file0" or missing value 14:54:56 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00082dbd7000fbdbdf25060800040003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r4}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f00000007c0)={{0xa, 0x4e20, 0xffffffffffffffe0, @empty}, {0xa, 0x4e24, 0x3, @ipv4={[], [], @remote}, 0x8000}, 0x6, [0x5, 0x7, 0x5, 0x1000, 0x8, 0x1, 0x8001, 0x2]}, 0x5c) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r3, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0xfffffffffffffffd, &(0x7f0000000840)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e3a66696c65302c776f726b6469723d2e2f668b6c653147e8f305dc9c1350b83658640de1a1e5aedaf972"]) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:56 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:56 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x5, 0x507100) ioctl$VIDIOC_G_JPEGCOMP(r1, 0x808c563d, &(0x7f0000000100)) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000740)='bcsf0\x00') ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)={0x1, 0x6, 0x3, 0x3, 0x6, [{0x33, 0x7, 0x5, 0x0, 0x0, 0x88}, {0x4, 0x4, 0x7, 0x0, 0x0, 0x5}, {0xfffffffffffffffc, 0x6, 0x0, 0x0, 0x0, 0x400}, {0x0, 0xa408, 0x7ff, 0x0, 0x0, 0x2000}, {0x9, 0x3, 0x0, 0x0, 0x0, 0x81}, {0x2, 0xda, 0x1, 0x0, 0x0, 0x200}]}) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000080)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x48000, 0x4) write$binfmt_script(r0, 0x0, 0x0) 14:54:56 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:56 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:56 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xc3ffffff00000000}, 0x0) 14:54:56 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:56 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xffffffff00000000}, 0x0) 14:54:57 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) fgetxattr(r0, &(0x7f0000000140)=@known='trusted.overlay.metacopy\x00', &(0x7f00000007c0)=""/134, 0x86) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r4}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r3, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:57 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:57 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0xffffffffa0010000}, 0x0) 14:54:57 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:54:57 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:57 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:57 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:57 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x2}, 0x0) 14:54:57 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:57 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) [ 1320.142684][ T1786] overlayfs: filesystem on './file0' not supported as upperdir 14:54:58 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x3}, 0x0) 14:54:58 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:58 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x2) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0/file1/file0\x00', 0xffffffffffffffff) symlink(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000340)=0x1, &(0x7f00000003c0)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r1, &(0x7f0000000540)={0x50, 0xfffffffffffffffc, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x5, 0x6, 0xffffffffffffff93}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c00009eee86730b1acb2f74bf5e00", @ANYRES16=0x0, @ANYBLOB="000c29bd7000fddbdf25010000000000000002410000001000137564703a73797a3000000000"], 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r4}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r3, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"]) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:58 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:54:58 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x4}, 0x0) 14:54:58 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:58 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:58 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:58 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:58 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x5}, 0x0) 14:54:58 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:58 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(r1, 0x0, 0x2f) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)=ANY=[@ANYBLOB="19080000", @ANYRES16=0x0, @ANYBLOB="000c29bd7000fddbdf25010000000000000002410000001000137564703a73797a3000000000"], 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r5}, 0x14) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r4, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0xa, &(0x7f00000002c0)=ANY=[@ANYRESOCT]) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000600)={0xfffffffffffff801, 0x200, 0x200, 0x42, 0x0}, &(0x7f0000000b40)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000b80)={0x0, 0xe6}, &(0x7f0000000bc0)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f0000000c80)={0x0, @in6={{0xa, 0x4e23, 0x2, @remote, 0x7ff}}, 0xfffffffffffff800, 0x1, 0x7f71, 0x9, 0x8}, &(0x7f0000000c00)=0x98) sendmsg$inet_sctp(r2, &(0x7f0000000e40)={&(0x7f0000000140)=@in6={0xa, 0x4e24, 0x80000001, @rand_addr="cec59963725222872843d28c1b44fdef", 0x9}, 0x1c, &(0x7f0000000ac0)=[{&(0x7f0000000340)="cc5bb5b39994cc2fdbff686dab4d86a4120ffccbb1ba8eabbb470a98c53a8b8710cf50a32cb3aa84bb1b55fce1ae47a5f77c9374fce9e4bc00f5", 0x3a}, {&(0x7f00000003c0)="72b32426697ffe86fedde4cc74847cb96d21f59be45f510d143185a5403172ac40ad2a2eed3dc2a9d317061d099884c8447bb3166e7cdb911f776df6e44a4f6e", 0x40}, {&(0x7f00000007c0)="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", 0xfb}, {&(0x7f00000008c0)="0e66f58c8eea18813ae285429ace1966debde81cc0892aca36ed5e24b112ca4e3f24ff42583f432c8475e6427d592da984883c4d6458390b794a9e0c8f1e7f87c015beccbecc202e98bf26714308937178d18d366041e0819efb6fa0641e19335b93bdd37828a85746f6cbc6ac557890efde9cfe5830371ddab62a0ade4dd0b8343cad62c4177d8b765018ed529c4a98d7cecb9ddf92695fd8170ef3f128", 0x9e}, {&(0x7f0000000980)="b4c30e4abb96a4f2d887e301e00ce2dd36d98a86cf807c6ffbce181d95ae94b02a2a48f85918c526636dc2ffab86df2a2b498cc0aaf1694711da81085cec55b3051c255e2ffe9af7d38e9ffc6328f36be961aff6ddffb7fa23bb8130afb6fc5d5f4b1120a65f5d5d1b0f29eea68db84305e289018ad4fc3e3ad80bc6db41cd8b0427671b478808ae0362e2a06b7fec43da095e94655375b12ab518b52a9adbd4b376790f0d2b5112975437", 0xab}, {&(0x7f0000000a40)="fa3bd6843aa850ec989b8ea471c1b22bc86c3c08715536d0ddc5a7a534d772bf492e4625d0d923e3791f67801a9f90b8f5326047fb19cfbf12d9b5d8c1d94e2dec730f39c8d40cad1f61abe6e210f2cbd0bcea1a69e4459206a82ff5ffe84464d2ab", 0x62}], 0x6, &(0x7f0000000d40)=[@prinfo={0x18, 0x84, 0x5, {0x20, 0x9}}, @sndinfo={0x20, 0x84, 0x2, {0xf4, 0x200, 0x4, 0xffffffffe5a6804a, r6}}, @init={0x18, 0x84, 0x0, {0x3, 0x7, 0x100, 0x9}}, @sndinfo={0x20, 0x84, 0x2, {0x0, 0x5, 0x24000000000, 0x3ff, r7}}, @init={0x18, 0x84, 0x0, {0x3, 0x9, 0x51, 0x81c1}}, @sndrcv={0x30, 0x84, 0x1, {0x8, 0xfffffffffffffffd, 0x0, 0x3e5, 0x2, 0x9, 0x5, 0xfffffffffffffff8, r8}}, @init={0x18, 0x84, 0x0, {0xfb71, 0x3, 0x7, 0x5}}, @authinfo={0x18, 0x84, 0x6, {0x8}}], 0xe8, 0x40000}, 0x8000) 14:54:59 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:59 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:59 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:54:59 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x4, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:54:59 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x6}, 0x0) [ 1321.594921][ T1926] overlayfs: unrecognized mount option "01777777777777777777777" or missing value 14:54:59 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) [ 1321.829875][ T1941] overlayfs: unrecognized mount option "01777777777777777777777" or missing value 14:54:59 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:59 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x8}, 0x0) 14:54:59 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) r2 = socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r2, 0x0, 0x166) 14:54:59 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:54:59 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:00 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1/file0\x00', 0x80002, 0x80) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r5}, 0x14) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r4, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:00 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:00 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:00 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xa}, 0x0) 14:55:00 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:00 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:00 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xc}, 0x0) 14:55:00 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000280)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) r2 = socket$inet(0x2b, 0x5, 0x28d) syz_mount_image$btrfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) semget$private(0x0, 0x3, 0x200) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x83, &(0x7f0000000380), 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='sys\xffem.posix_a\x1a\xa9,\xb5\x82P\xe2\xe2cl_default\x00\a\xe2D\x95\xf7y\xb3\xa3\x8f\x9ek\x86/\'76\xe79@uJ\x85H\x16v\xf3\xd3\xe4]\xa1\x86\xbd\x89W\x9bA\xdf\xce\xc3\x18\xaa\xd8ZO\xb9\x17\x85_\xbck\x9f\x82\xd1\x95\x8ayv\xb3\x13\xaa\x02W\xf9dU\xd4\xe6\xc0\x12\x86\xcbW\xaa\xa6o\x066\xd9\a\xc5#H', 0x0, 0xd, 0x0) perf_event_open(&(0x7f0000005240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x101000, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(0xffffffffffffffff, 0xc040563d, 0x0) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65302c776f726b646988c7723d2e2f66696c6531"]) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, 0x0, 0x2c) ioctl$EVIOCGKEY(r3, 0x80404518, &(0x7f00000003c0)=""/32) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0xa}}, 0x20) ioctl$void(r2, 0x5451) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000400)) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r3, 0xc00c642d, 0x0) mkdir(&(0x7f0000000640)='./file1\x00', 0x0) syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x2, 0x2) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000300)={0x0, 0xc3, 0x4, [0x8, 0xfffffffffffffffd, 0xc43, 0x80000001]}, &(0x7f0000000440)=0x10) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) 14:55:00 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:00 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) [ 1322.916045][ T1999] overlayfs: filesystem on './file0' not supported as upperdir 14:55:00 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xe}, 0x0) 14:55:00 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={0x0}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:00 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) r0 = accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r1, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f0000000980)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, &(0x7f00000008c0)={r0, r0, 0x0, 0xed, &(0x7f00000007c0)="cfb1ae53c0425311c4866c8448818dd6d484f8dedc166cd07faabb76b17ca38cd8a74ca7cbdd4ba6068b39e67b4017df077888eb1154a53fc52cfdf16ea955970b124bf053965ddfb1aa92ee7ac034323d5160d4c540afe4290d2b751dcd124b9f1df90f7012592514dcc6de4be1626b1225087bd5a9c5a281b124954a3372340ec65fa4c80613bf593bbc4256daae3cfbe27913397b371bc4992073af8a7fd0a492aa5096fe42f6e21875eb318647be67aa7938e9481a949d64871453a548e99ad5a9db023fb2b9c1600922629483530250bc9dbe6817e97d218a37e0c74008f902c5396b6ffc35a0bc6b8e5e", 0x100, 0x1ff, 0x3, 0x10000, 0x6, 0x3, 0x10001, 'syz0\x00'}) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r5}, 0x14) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r4, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:01 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:01 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) [ 1323.284015][ T2050] overlayfs: unrecognized mount option "workdiˆÇr=./file1" or missing value 14:55:01 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x10}, 0x0) 14:55:01 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) [ 1323.612364][ T2107] overlayfs: unrecognized mount option "workdiˆÇr=./file1" or missing value [ 1323.623638][ T2091] overlayfs: filesystem on './file0' not supported as upperdir 14:55:01 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:01 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x60}, 0x0) 14:55:01 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3d, &(0x7f0000000080)=""/12, &(0x7f00000000c0)=0xc) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000200)=0x3e73, 0xffffffffffffffb1) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x4000, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r2, 0xc008551b, &(0x7f0000000180)={0x20, 0x10, [0x3f, 0x7fff, 0x3, 0x6a]}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000140)=0x8001, 0x4) syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:55:01 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) openat(0xffffffffffffffff, &(0x7f0000000140)='.\x00', 0x113882, 0x40) r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x80800) accept4$bt_l2cap(r0, 0x0, 0x0, 0x7fffc) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r1, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r5}, 0x14) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r4, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:01 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={0x0}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:01 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:01 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:01 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x1a0}, 0x0) 14:55:01 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:02 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x300}, 0x0) 14:55:02 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) [ 1324.490818][ T2156] overlayfs: filesystem on './file0' not supported as upperdir 14:55:02 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:02 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={0x0}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:02 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x500}, 0x0) 14:55:02 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) flock(r0, 0x7) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_MCAST_LEAVE_GROUP(r2, 0x29, 0x2d, &(0x7f0000000080)={0x2, {{0xa, 0x4e22, 0x8, @remote, 0x7f9}}}, 0x88) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000140)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:55:02 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x110001) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x4003ff) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 14:55:02 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:02 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:02 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x600}, 0x0) 14:55:03 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:03 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:03 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:03 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xa00}, 0x0) 14:55:03 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:03 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xc00}, 0x0) 14:55:03 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:03 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e77, 0x3533eb9a4c87853c) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:55:03 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0xef}, 0x10) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x2) prctl$PR_SET_PDEATHSIG(0x1, 0x2d) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10040680}, 0xc, &(0x7f00000003c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="010327bd7000fddbdf2506000000080005008100000008000400ffffffff08000600070000004c00030014000600ff0100000000000000000000000000010800040006000000080004007f0000001400020069726c616e3000000000000000000000080005007f00000108000500ac1e0001480001000c00070007000000000000000c000700100000000c00000008000800c0ffffff080004004e2200000c000700240000000400000008000500031c000008000600727200000800060000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x40801) fgetxattr(r4, &(0x7f0000000300)=@random={'trusted.', '/dev/infiniband/rdma_cm\x00'}, &(0x7f00000005c0)=""/4096, 0x1000) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000440)={'ipddp0\x00', {0x2, 0x4e21, @empty}}) personality(0x400000) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000280)) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f0000000100)={0xf, 0x8}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4000000004e23}, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x2) clone(0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r3, 0x40000000000001) ioctl$sock_inet_udp_SIOCINQ(r3, 0x541b, &(0x7f0000000080)) 14:55:03 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xe00}, 0x0) 14:55:03 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:03 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:03 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:03 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x3f00}, 0x0) 14:55:04 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:04 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:04 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x4000}, 0x0) 14:55:04 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x8100, 0x0) write$P9_RRENAME(r2, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:55:04 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:04 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:04 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0xef}, 0x10) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x2) prctl$PR_SET_PDEATHSIG(0x1, 0x2d) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10040680}, 0xc, &(0x7f00000003c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="010327bd7000fddbdf2506000000080005008100000008000400ffffffff08000600070000004c00030014000600ff0100000000000000000000000000010800040006000000080004007f0000001400020069726c616e3000000000000000000000080005007f00000108000500ac1e0001480001000c00070007000000000000000c000700100000000c00000008000800c0ffffff080004004e2200000c000700240000000400000008000500031c000008000600727200000800060000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x40801) fgetxattr(r4, &(0x7f0000000300)=@random={'trusted.', '/dev/infiniband/rdma_cm\x00'}, &(0x7f00000005c0)=""/4096, 0x1000) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000440)={'ipddp0\x00', {0x2, 0x4e21, @empty}}) personality(0x400000) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000280)) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f0000000100)={0xf, 0x8}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4000000004e23}, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x2) clone(0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r3, 0x40000000000001) ioctl$sock_inet_udp_SIOCINQ(r3, 0x541b, &(0x7f0000000080)) 14:55:04 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x5865}, 0x0) 14:55:04 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:04 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:05 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:05 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x6000}, 0x0) 14:55:05 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0xef}, 0x10) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x2) prctl$PR_SET_PDEATHSIG(0x1, 0x2d) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10040680}, 0xc, &(0x7f00000003c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="010327bd7000fddbdf2506000000080005008100000008000400ffffffff08000600070000004c00030014000600ff0100000000000000000000000000010800040006000000080004007f0000001400020069726c616e3000000000000000000000080005007f00000108000500ac1e0001480001000c00070007000000000000000c000700100000000c00000008000800c0ffffff080004004e2200000c000700240000000400000008000500031c000008000600727200000800060000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x40801) fgetxattr(r4, &(0x7f0000000300)=@random={'trusted.', '/dev/infiniband/rdma_cm\x00'}, &(0x7f00000005c0)=""/4096, 0x1000) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000440)={'ipddp0\x00', {0x2, 0x4e21, @empty}}) personality(0x400000) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000280)) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f0000000100)={0xf, 0x8}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4000000004e23}, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x2) clone(0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r3, 0x40000000000001) ioctl$sock_inet_udp_SIOCINQ(r3, 0x541b, &(0x7f0000000080)) 14:55:05 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x101000, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000180)={0xa0d, 0x81c4, 0x4, 0x2, 0x20}) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f00000000c0)={0x20, 0x7ff, 0x3, 0x4, 0x6, 0xfffffffffffff801}) listen(r0, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000280)='memory.events\xcb\x7f\xb5\xf3\x03T\xd7\x0e\x8b\xbb\x00', 0x0, 0x0) ioctl$UI_DEV_DESTROY(r2, 0x5502) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r3, 0x89a0, &(0x7f0000000080)='bond_slave_0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) write$apparmor_current(r2, &(0x7f0000000100)=@hat={'changehat ', 0x2, 0x5e, ['bond_slave_0\x00']}, 0x2a) ioctl$sock_SIOCBRDELBR(r3, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:55:05 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:05 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x6558}, 0x0) 14:55:05 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x0, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:05 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:05 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x8100}, 0x0) 14:55:05 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:06 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) timer_create(0x7, &(0x7f00000001c0)={0x0, 0x26, 0x0, @thr={&(0x7f0000000080)="e210536b715f09a7f0240ee61b972d6c48f8050d57d9d6fb1c2e7c4baaa93ca40478b3e4d35534fda78dfad243fedd260e60ce439de5", &(0x7f00000000c0)="c3aab4f54702b516cd8c563a9bcec5a9ae1cd71ed525517d01a177a231a3f5d6f3bc11382f51bb76243cdee4934dbd6d15f986ff3c3c24759133ee72bf3e51340ab976c8a3a2a3d95a3c98e695901061657210eadf3f1a7e9236c93c18d8b6006a77be9c8a96bcbefcecc96637c6a646b740000f263f2dd1ded007eb7105feb5a1f361c5b2127a1c1468fed617a52965e3144f730bdde219bdd3a2e159c39e37983e480aab4fa22f687cb8ac0198525930e2a257d7ce78b740fd510688ff0b8070296d8bbfc4a67b92c8ca2939579bce0ab55efbe1239279aa"}}, &(0x7f0000000200)=0x0) listen(r0, 0x4) timer_gettime(r1, &(0x7f0000000280)) listen(r0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0xfffffffffffffffa, 0x2) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000300)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x99cbcff16c7b06c8, 0x80000000000000) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000002c0), 0x10) write$binfmt_script(r0, 0x0, 0x0) 14:55:06 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:06 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x1a000}, 0x0) 14:55:06 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:06 executing program 2: r0 = socket(0x80000000000002, 0x400000000002, 0x0) sendmsg(r0, &(0x7f0000002000)={&(0x7f0000000000)=ANY=[@ANYBLOB="5602000000000000ffff"], 0x1, 0x0}, 0x0) 14:55:06 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x0, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:06 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x34000}, 0x0) 14:55:06 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:06 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000440)="4c0000001200ff09fffefd956fa283b7270fd917df226c24a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f", 0x4c}], 0x1}, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000001380), 0x0, 0x0, 0x0) 14:55:06 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) [ 1328.949150][ T2541] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1329.048324][ T2541] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. 14:55:06 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x400300}, 0x0) 14:55:06 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) [ 1329.178243][ T2541] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. 14:55:07 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r2 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x3, 0x80000) ioctl$UI_SET_PHYS(r2, 0x4008556c, &(0x7f00000000c0)='syz0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) [ 1329.257372][ T2541] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. 14:55:07 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:07 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x0, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:07 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x4a6c00, 0x0) accept4(r0, &(0x7f00000001c0)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000000c0)) mlockall(0x400000000007) getresgid(0x0, &(0x7f0000000140), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) mlockall(0x4) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) 14:55:07 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:07 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xa00100}, 0x0) 14:55:07 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:07 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:07 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x1000000}, 0x0) 14:55:07 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) r2 = socket$inet(0x2, 0xfffffffffffffffe, 0x0) write$binfmt_script(r0, 0x0, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={0x1, @null, @netrom={'nr', 0x0}, 0x3f, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x1, 0x7, [@null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000200)={r2}) 14:55:07 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:08 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:08 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x0, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:08 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x2000000}, 0x0) 14:55:08 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:09 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:09 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:09 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x3000000}, 0x0) 14:55:09 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:55:09 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:09 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x0, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:09 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x4000000}, 0x0) 14:55:09 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:09 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:09 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:09 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x5000000}, 0x0) 14:55:09 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:10 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:10 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x0, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:10 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000080)={0x0, 0xb6, "106b3e6e80de89c8cf751b1390645c87c9185b15594003602b3965ca9708d71de547bb0976d47b83396f4a3639ab211ebfb170b51e0c4d1d5230a609511e79830a648bf44294fd859f186513ea6e92f8cb818ed33ecb61c0061c71b86767b159ad366b9ed9cc982edf2ad1a42d9088270029e024e8d6a1f33d3953e60f13ae8b6f29604c69310c972043e6221bb25f9ac08be26b5cc1eb2441d1a5e5da41b7d017277996a2e3e5871da22897912ec8dab54b4086e686"}, &(0x7f0000000140)=0xbe) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000180)={r2, @in={{0x2, 0x4e24}}}, 0x84) socket$inet(0x2, 0x0, 0x2) write$binfmt_script(r0, 0x0, 0x0) 14:55:10 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:10 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x6000000}, 0x0) 14:55:10 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:10 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:10 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:10 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x8000000}, 0x0) 14:55:10 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:10 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:10 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:10 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xa000000}, 0x0) 14:55:10 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:10 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x3) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000080)={0x1, 0x10000}, 0x8) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2000005, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000200)='nhmon0\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:55:10 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:11 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:11 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:11 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xc000000}, 0x0) 14:55:11 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:11 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f00000000c0)='ip6_vti0\x00') r2 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) sendmsg$nfc_llcp(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x27, 0x1, 0x1, 0x0, 0xa9, 0xd84, "f293d80498a6f99386ef6acfc45175f4887b9fc7661e570869a15cfb312a7cd1f4735a9ed37ade3b6b624a19f933daf7da03633125b90697e2b446983b0e23"}, 0x60, &(0x7f00000001c0)=[{&(0x7f0000000180)="14fb1b9b16d58e19e5a06ddadefe93180fa499acd4977a752bf2bacf3fac6287851156d3285a1096538499b7b629d75c85156f19bc4255e4f4719b", 0x3b}, {&(0x7f0000000280)="9523194a918e97fade28351bda8ba9dfd529c9fd728688d98b6a6db32f9e092d4a16bd9d199bb02486f63a073ad0e3aa23b92f6a1429d85bd2a45b4ed7c6877c0daa461ede023a8705cdcff022955154da23250adcb6c8da9ce16db72acf7c4572aa6b8504c4831479d8f0dbc7c3de7847f4e9c381f03628681b97141934fcb3f783e53d65ccee616687915da3", 0x8d}], 0x2, &(0x7f0000000340)={0x58, 0x0, 0x0, "3354dd60ce828f106fd052b5a868951aabc10c887dfe4b8369fbea711a2313fedfb0a5576f5f0ceca6f662d208656f6f21e7afd1b44fe89e02e09aafbca77e8132500409e23e7fc4"}, 0x58, 0x4001}, 0x0) syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000080)=0x8, 0x4) write$binfmt_script(r0, 0x0, 0x0) 14:55:11 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:11 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xe000000}, 0x0) 14:55:11 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:11 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:11 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:11 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:11 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x10000000}, 0x0) 14:55:12 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:12 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0xffffffff, 0x2) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r1, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x10000003e73, 0xfffffeae) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000b00)='\x00\x00\x05\x00\xdb\xf8\x00\x00\xbdk\x00') accept4$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14, 0x80800) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0xeb, 0x200) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f00000000c0)=0xefa5, 0x4) syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x800, 0x2ca) write$binfmt_script(r1, 0x0, 0x0) 14:55:12 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:12 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:12 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:12 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:12 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) write(r0, &(0x7f0000000100)="ad89e131cc2ff6f54bf289a6769fab9c0cc5195d0dfb0b", 0x17) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$sock_netdev_private(r1, 0x89f5, &(0x7f0000000080)="92a199edb2a4c8da621d79a8c25ea263b9d818f599fab8f5a92ce32c727c324280f6bf28fa1f71670e2f1549d92e73ad67ac8a2d4a674f2aad002ffbf6a46db724770d75ec48dcb2a4") syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:55:12 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:12 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:12 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:12 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:12 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x3f000000}, 0x0) 14:55:12 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:13 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:13 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:13 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x9, 0x4041) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:55:13 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:13 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x40000000}, 0x0) 14:55:13 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:13 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:13 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x60000000}, 0x0) 14:55:13 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:13 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:13 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:13 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:13 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x65580000}, 0x0) 14:55:13 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) r2 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x3, 0x20000) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00000000c0)=""/213, &(0x7f00000001c0)=0xd5) write$binfmt_script(r0, 0x0, 0x0) 14:55:14 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:14 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:14 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x81000000}, 0x0) 14:55:14 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:14 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x88a8ffff}, 0x0) 14:55:14 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:14 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:14 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:14 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xa0010000}, 0x0) 14:55:14 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc058534f, &(0x7f00000001c0)={{0xf9f, 0x400}, 0x1, 0x1, 0x8, {0x7, 0x734}, 0x52d74e1c, 0x2}) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) fsetxattr$security_capability(r1, &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0xfffffffffffffffc, 0x7}]}, 0xc, 0x3) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x5, 0x1000, 0x4}}, 0x30) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) 14:55:14 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:15 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xc3ffffff}, 0x0) 14:55:15 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r5}, 0x14) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r4, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:15 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:15 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:15 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xffffa888}, 0x0) 14:55:15 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:15 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:15 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xffffffc3}, 0x0) 14:55:15 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:15 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000140)={0x743f6140, 0x0, 0x8, 0xffff, 0x5, 0x29, 0x1}, 0xc) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') ioctl$SIOCX25SENDCALLACCPT(r0, 0x89e9) syz_genetlink_get_family_id$team(0x0) r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x100000001, 0x105001) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:55:16 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r5}, 0x14) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r4, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:16 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x2) 14:55:16 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x1a0ffffffff}, 0x0) 14:55:16 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x3) 14:55:16 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x40030000000000}, 0x0) 14:55:16 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r5}, 0x14) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r4, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:16 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xa0010000000000}, 0x0) 14:55:16 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x4) 14:55:16 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:16 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x48, 0x10200) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r3, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x0) 14:55:16 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:17 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x2) 14:55:17 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x5) 14:55:17 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x0, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:17 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x3) 14:55:17 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x6) 14:55:17 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') socket$caif_seqpacket(0x25, 0x5, 0x2) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000140)=0x3d, 0xffffffffffffff00) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:55:17 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x100000000000000}, 0x0) 14:55:17 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x8) 14:55:17 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x4) 14:55:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:18 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x200000000000000}, 0x0) 14:55:18 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x0, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:18 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xa) 14:55:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:18 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x5) 14:55:18 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xc) 14:55:18 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x300000000000000}, 0x0) 14:55:18 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x9, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) 14:55:18 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x6) 14:55:18 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xe) 14:55:18 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x0, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:18 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x400000000000000}, 0x0) 14:55:18 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x8) 14:55:19 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x10) 14:55:19 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(r0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x8, 0x20000) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r2, 0x40405515, &(0x7f0000000180)={0x2, 0x7, 0x3a, 0x7, '\x00', 0x10000}) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000740)='bcsf0\x00') setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000b00)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, &(0x7f00000001c0)={0x5, 0x3, {0xffffffffffffffff, 0x3, 0x5, 0x3, 0x100}}) socket$pppoe(0x18, 0x1, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x44000, 0x0) connect$unix(r3, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e) 14:55:19 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:19 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xa) 14:55:19 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x500000000000000}, 0x0) 14:55:19 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x60) 14:55:19 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:19 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xc) 14:55:19 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x600000000000000}, 0x0) 14:55:19 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:19 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x1a0) 14:55:19 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:20 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x800000000000000}, 0x0) 14:55:20 executing program 3: connect$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @netrom, @rose, @rose]}, 0x48) listen(0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000740)='bcsf0\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/current\x00') ioctl$CAPI_INSTALLED(r1, 0x80024322) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000240)=0x3e73, 0x4) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000080)='bcsf0\x00\x00\x00\x00\x00\x00h\x11\x00') syz_genetlink_get_family_id$team(0x0) r2 = socket$inet(0x2, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000100)) 14:55:20 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x300) 14:55:20 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xe) 14:55:20 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:20 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xa00000000000000}, 0x0) 14:55:20 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x10) 14:55:20 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x500) 14:55:20 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:20 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:20 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x60) 14:55:20 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xc00000000000000}, 0x0) 14:55:20 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x600) 14:55:20 executing program 3: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:21 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:21 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xa00) 14:55:21 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xe00000000000000}, 0x0) 14:55:21 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x1a0) 14:55:21 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:21 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x1000000000000000}, 0x0) 14:55:21 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:21 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xc00) 14:55:21 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x300) 14:55:21 executing program 3: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:21 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xe00) 14:55:21 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x3f00000000000000}, 0x0) 14:55:21 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x500) 14:55:22 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x4000000000000000}, 0x0) 14:55:22 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x3f00) 14:55:22 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r5}, 0x14) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r4, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:22 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x600) 14:55:22 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x6000000000000000}, 0x0) 14:55:22 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:22 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x4000) 14:55:22 executing program 3: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:22 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xa00) 14:55:22 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x6558000000000000}, 0x0) 14:55:22 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x5865) 14:55:22 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xc00) 14:55:22 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r5}, 0x14) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r4, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:22 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x6000) 14:55:22 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x8100000000000000}, 0x0) 14:55:22 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xe00) 14:55:22 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x88a8ffff00000000}, 0x0) 14:55:23 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:23 executing program 3: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:23 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x4000) 14:55:23 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r5}, 0x14) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r4, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:23 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x6558) 14:55:23 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xc3ffffff00000000}, 0x0) 14:55:23 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x8100) 14:55:23 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x5865) 14:55:23 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xffffffff00000000}, 0x0) 14:55:23 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x1a000) 14:55:23 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x6000) 14:55:23 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) bind$packet(r5, &(0x7f0000000200), 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:24 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0xffffffffa0010000}, 0x0) 14:55:24 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x34000) 14:55:24 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x6558) 14:55:24 executing program 3: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:24 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) bind$packet(r5, &(0x7f0000000200), 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:24 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x400300) 14:55:24 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:24 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x8100) 14:55:24 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:24 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xa00100) 14:55:24 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x1a000) 14:55:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:25 executing program 3: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:25 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x1000000) 14:55:25 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:25 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) bind$packet(r5, &(0x7f0000000200), 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:25 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x34000) 14:55:25 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x2000000) 14:55:25 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:25 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x400300) 14:55:25 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x3000000) 14:55:25 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:25 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:26 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xa00100) 14:55:26 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x4000000) 14:55:26 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:26 executing program 3: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:26 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:26 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x1000000) 14:55:26 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x5000000) 14:55:26 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:26 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x2000000) 14:55:26 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x6000000) 14:55:26 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:27 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x3000000) 14:55:27 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:27 executing program 3: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00082dbd7000fbdbdf25060800040003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000200)={0x11, 0x0, r4}, 0x14) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f00000007c0)={{0xa, 0x4e20, 0xffffffffffffffe0, @empty}, {0xa, 0x4e24, 0x3, @ipv4={[], [], @remote}, 0x8000}, 0x6, [0x5, 0x7, 0x5, 0x1000, 0x8, 0x1, 0x8001, 0x2]}, 0x5c) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r3, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0xfffffffffffffffd, &(0x7f0000000840)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e3a66696c65302c776f726b6469723d2e2f668b6c653147e8f305dc9c1350b83658640de1a1e5aedaf972"]) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:27 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x8000000) 14:55:27 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:27 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xa000000) 14:55:27 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x4000000) 14:55:27 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:27 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xc000000) 14:55:27 executing program 3: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) r0 = accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10080, 0x0) ioctl$TIOCLINUX4(r1, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(r0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(0x0, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r5}, 0x14) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r4, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:27 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x5000000) 14:55:27 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x6000000) 14:55:27 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:27 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xe000000) 14:55:27 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) bind$packet(r5, 0x0, 0x0) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:27 executing program 3: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:28 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:28 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x10000000) 14:55:28 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x8000000) 14:55:28 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:28 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x3f000000) 14:55:28 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) bind$packet(r5, 0x0, 0x0) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:28 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xa000000) 14:55:28 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:28 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x40000000) 14:55:28 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xc000000) 14:55:28 executing program 3: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r2, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r5}, 0x14) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r4, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:28 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:28 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) bind$packet(r5, 0x0, 0x0) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:28 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:28 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x60000000) 14:55:28 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xe000000) 14:55:29 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x10000000) 14:55:29 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:29 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x65580000) 14:55:29 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:29 executing program 3: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r2, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r5}, 0x14) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r4, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:29 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) bind$packet(r5, &(0x7f0000000200), 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:29 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x40000000) 14:55:29 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x81000000) 14:55:29 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:29 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x60000000) 14:55:29 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x88a8ffff) 14:55:29 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:29 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xa0010000) 14:55:29 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) bind$packet(r5, &(0x7f0000000200), 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:29 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:30 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x65580000) 14:55:30 executing program 3: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r2, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r5}, 0x14) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r4, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:30 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xc3ffffff) 14:55:30 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:30 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) bind$packet(r5, &(0x7f0000000200), 0x14) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:30 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:30 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xffffa888) 14:55:30 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x81000000) 14:55:30 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:30 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xffffffc3) 14:55:30 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:31 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x88a8ffff) 14:55:31 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:31 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x1a0ffffffff) 14:55:31 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5334, &(0x7f0000000040)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, 0x0) 14:55:31 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:31 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xa0010000) 14:55:31 executing program 3: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) r3 = epoll_create1(0x0) close(r2) syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r2, &(0x7f0000000140)={0x5}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:55:31 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x40030000000000) 14:55:31 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:31 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xa0010000000000) 14:55:31 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:32 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xc3ffffff) 14:55:32 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:32 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x100000000000000) 14:55:32 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0x0, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:32 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:32 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xffffa888) 14:55:32 executing program 3: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) r3 = epoll_create1(0x0) close(r2) syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r2, &(0x7f0000000140)={0x5}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:55:32 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x200000000000000) 14:55:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:32 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:32 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xffffffc3) 14:55:32 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0x0, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:32 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x300000000000000) 14:55:32 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:32 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x400000000000000) 14:55:32 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x1a0ffffffff) 14:55:32 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:33 executing program 3: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) r3 = epoll_create1(0x0) close(r2) syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r2, &(0x7f0000000140)={0x5}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:55:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:33 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x40030000000000) 14:55:33 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:33 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x500000000000000) 14:55:33 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0x0, &(0x7f0000000000)=0x7, 0x4) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:33 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x600000000000000) 14:55:33 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xa0010000000000) 14:55:33 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:33 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x100000000000000) 14:55:33 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x800000000000000) 14:55:33 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:34 executing program 3: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) r3 = epoll_create1(0x0) close(r2) syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r2, &(0x7f0000000140)={0x5}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:55:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:34 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x200000000000000) 14:55:34 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, 0x0, 0x0) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:34 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xa00000000000000) 14:55:34 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:34 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xc00000000000000) 14:55:34 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x300000000000000) 14:55:34 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:34 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xe00000000000000) 14:55:34 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x400000000000000) 14:55:34 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) writev(r1, &(0x7f0000001500)=[{&(0x7f0000000480)="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", 0x1000}], 0x1) write$binfmt_aout(r1, &(0x7f0000001540)=ANY=[@ANYBLOB="3adde1"], 0x3) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 1357.101597][ T4467] attempt to access beyond end of device [ 1357.108657][ T4467] loop3: rw=2049, want=130, limit=112 [ 1357.114875][ T4467] attempt to access beyond end of device [ 1357.120644][ T4467] loop3: rw=2049, want=130, limit=112 [ 1357.126245][ T4467] Buffer I/O error on dev loop3, logical block 129, lost async page write [ 1357.135390][ T4467] attempt to access beyond end of device [ 1357.141149][ T4467] loop3: rw=2049, want=131, limit=112 [ 1357.146529][ T4467] Buffer I/O error on dev loop3, logical block 130, lost async page write [ 1357.155154][ T4467] attempt to access beyond end of device [ 1357.160890][ T4467] loop3: rw=2049, want=132, limit=112 [ 1357.166269][ T4467] Buffer I/O error on dev loop3, logical block 131, lost async page write [ 1357.174888][ T4467] attempt to access beyond end of device [ 1357.180611][ T4467] loop3: rw=2049, want=133, limit=112 [ 1357.185991][ T4467] Buffer I/O error on dev loop3, logical block 132, lost async page write [ 1357.194572][ T4467] attempt to access beyond end of device [ 1357.200265][ T4467] loop3: rw=2049, want=150, limit=112 [ 1357.205640][ T4467] Buffer I/O error on dev loop3, logical block 149, lost async page write [ 1357.214362][ T4467] attempt to access beyond end of device [ 1357.220049][ T4467] loop3: rw=2049, want=151, limit=112 [ 1357.225416][ T4467] Buffer I/O error on dev loop3, logical block 150, lost async page write [ 1357.233984][ T4467] attempt to access beyond end of device [ 1357.240665][ T4467] loop3: rw=2049, want=152, limit=112 [ 1357.246043][ T4467] Buffer I/O error on dev loop3, logical block 151, lost async page write [ 1357.254686][ T4467] attempt to access beyond end of device [ 1357.260360][ T4467] loop3: rw=2049, want=153, limit=112 [ 1357.265726][ T4467] Buffer I/O error on dev loop3, logical block 152, lost async page write [ 1357.274754][ T4467] attempt to access beyond end of device [ 1357.280464][ T4467] loop3: rw=2049, want=154, limit=112 [ 1357.293319][ T4470] attempt to access beyond end of device [ 1357.304658][ T4470] loop3: rw=2049, want=130, limit=112 [ 1357.321026][ T4470] Buffer I/O error on dev loop3, logical block 129, lost async page write [ 1357.329858][ T4470] attempt to access beyond end of device [ 1357.335508][ T4470] loop3: rw=2049, want=131, limit=112 [ 1357.341075][ T4470] Buffer I/O error on dev loop3, logical block 130, lost async page write [ 1357.350080][ T4470] attempt to access beyond end of device [ 1357.355712][ T4470] loop3: rw=2049, want=132, limit=112 [ 1357.361270][ T4470] attempt to access beyond end of device [ 1357.367914][ T4470] loop3: rw=2049, want=133, limit=112 [ 1357.373364][ T4470] attempt to access beyond end of device [ 1357.382635][ T4470] loop3: rw=2049, want=150, limit=112 [ 1357.388130][ T4470] attempt to access beyond end of device [ 1357.393774][ T4470] loop3: rw=2049, want=151, limit=112 [ 1357.399259][ T4470] attempt to access beyond end of device 14:55:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:35 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, 0x0, 0x0) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:35 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x1000000000000000) 14:55:35 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:35 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x500000000000000) [ 1357.405085][ T4470] loop3: rw=2049, want=152, limit=112 [ 1357.410566][ T4470] attempt to access beyond end of device [ 1357.416459][ T4470] loop3: rw=2049, want=153, limit=112 14:55:35 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x600000000000000) 14:55:35 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) [ 1357.457947][ T4472] attempt to access beyond end of device [ 1357.491800][ T4472] loop3: rw=2049, want=130, limit=112 14:55:35 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x3f00000000000000) [ 1357.518364][ T4472] attempt to access beyond end of device [ 1357.524040][ T4472] loop3: rw=2049, want=131, limit=112 [ 1357.563748][ T4472] attempt to access beyond end of device [ 1357.618111][ T4472] loop3: rw=2049, want=132, limit=112 [ 1357.623582][ T4472] attempt to access beyond end of device 14:55:35 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:35 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x4000000000000000) [ 1357.692061][ T4472] loop3: rw=2049, want=133, limit=112 [ 1357.697918][ T4472] attempt to access beyond end of device [ 1357.703576][ T4472] loop3: rw=2049, want=150, limit=112 [ 1357.721216][ T4472] attempt to access beyond end of device [ 1357.726962][ T4472] loop3: rw=2049, want=151, limit=112 [ 1357.727032][ T4472] attempt to access beyond end of device 14:55:35 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x800000000000000) 14:55:35 executing program 3: ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) read(0xffffffffffffffff, &(0x7f0000000140)=""/250, 0x10000032c) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x3) geteuid() write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0\x00', 0x0, &(0x7f0000000680)=[&(0x7f0000000440)='/dev/loop#\x00', &(0x7f0000000480)='ns/net\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)='nodev\\selinux^,}\x00']) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) [ 1357.727042][ T4472] loop3: rw=2049, want=152, limit=112 [ 1357.727073][ T4472] attempt to access beyond end of device [ 1357.727083][ T4472] loop3: rw=2049, want=153, limit=112 14:55:36 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="03177f454c4606050700070000f9a8cf32028ad27e000d0000007b0300000000000040000000000000003f00380001000900ff4b0100020000000000000000000000000000"], 0x45) recvmmsg(r0, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003680)=""/15, 0xf}, {&(0x7f00000036c0)=""/180, 0xb4}], 0x2}}], 0x1, 0x0, 0x0) 14:55:36 executing program 0: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4$bt_l2cap(0xffffffffffffff9c, 0x0, 0x0, 0x80800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) ioctl(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000240)='./file1/file0\x00') setxattr$security_smack_entry(&(0x7f0000000480)='./file1\x00', &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x4, 0x400400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') write$FUSE_INIT(r3, &(0x7f0000000540)={0x50, 0x0, 0x8, {0x7, 0x1c, 0x7, 0x13810, 0x3, 0x2, 0x7fff, 0xe2e}}, 0x50) stat(0x0, &(0x7f00000004c0)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000780)={&(0x7f00000005c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, 0x0, 0x800, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4004000) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0xc, &(0x7f0000000700)={&(0x7f0000000400)={0x2c, 0x0, 0xc00, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r6}, 0x14) setsockopt$packet_int(r5, 0x107, 0xf, 0x0, 0x0) modify_ldt$write(0x1, &(0x7f0000000080)={0x9, 0xffffffffffffffff}, 0x10) io_submit(0x0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r5, &(0x7f0000000080), 0x2d3}]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) lchown(&(0x7f0000000000)='./file0/file1/file0\x00', 0x0, 0x0) 14:55:36 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x6000000000000000) 14:55:36 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xa00000000000000) 14:55:36 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x20000000) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x2, 0x8, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x202, 0x1, 0x7, 0x7, 0xfff, 0x6, 0x9, 0x7, 0x16, 0x0, 0x0, 0x7, 0x40, 0xc58, 0x1000, 0xc, 0xffffffffffffff6b, 0x101, 0x0, 0x7, 0x80, 0x0, 0x200, 0x3fb, 0x3, 0x0, 0x4, 0x6, 0x1ff, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x800, 0x4000000005, 0x0, 0x7, 0x8, 0x0, 0x71}, 0x0, 0x0, r0, 0x1) r3 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$inet6_int(r3, 0x29, 0x33, &(0x7f0000000040)=0x100000000001f, 0x87) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {0x1ea}, 0x15}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) pkey_alloc(0x0, 0x2) dup2(r2, r1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f0000000180)) syz_open_dev$video4linux(&(0x7f0000000500)='/dev/v4l-subdev#\x00', 0x6, 0x28000) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) 14:55:36 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0xc00000000000000) 14:55:36 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:36 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6}, 0x6558000000000000) [ 1358.537435][ C1] ================================================================== [ 1358.546647][ C1] BUG: KASAN: use-after-free in ccid_hc_tx_delete+0xde/0x100 [ 1358.554035][ C1] Read of size 8 at addr ffff8880a8aa5680 by task udevd/7664 [ 1358.561405][ C1] [ 1358.563779][ C1] CPU: 1 PID: 7664 Comm: udevd Not tainted 5.0.0+ #21 [ 1358.570560][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1358.580628][ C1] Call Trace: [ 1358.583942][ C1] 14:55:36 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) 14:55:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text16={0x10, &(0x7f0000000100)="0f20c06635000000800f22c065f26e76f10f01c8ba2000b001ee65650f5860f32e26660ffdfd660f3a21843d001eea0090e800ea5d002f01"}], 0xaaaaaaaaaaaadf6, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1358.586817][ C1] dump_stack+0x172/0x1f0 [ 1358.591156][ C1] ? ccid_hc_tx_delete+0xde/0x100 [ 1358.596194][ C1] print_address_description.cold+0x7c/0x20d [ 1358.602185][ C1] ? ccid_hc_tx_delete+0xde/0x100 [ 1358.607223][ C1] ? ccid_hc_tx_delete+0xde/0x100 [ 1358.607251][ C1] kasan_report.cold+0x1b/0x40 [ 1358.607265][ C1] ? ccid_hc_tx_delete+0xde/0x100 [ 1358.607282][ C1] __asan_report_load8_noabort+0x14/0x20 [ 1358.607299][ C1] ccid_hc_tx_delete+0xde/0x100 [ 1358.632667][ C1] dccp_sk_destruct+0x3f/0x90 [ 1358.637358][ C1] ? dccp_init_sock+0x3f0/0x3f0 [ 1358.637402][ C1] __sk_destruct+0x55/0x6d0 [ 1358.637421][ C1] ? proto_unregister+0x4e0/0x4e0 [ 1358.651868][ C1] rcu_core+0x928/0x1390 [ 1358.651891][ C1] ? rcu_check_gp_start_stall+0x250/0x250 [ 1358.661865][ C1] __do_softirq+0x266/0x95a [ 1358.666467][ C1] ? sched_clock_cpu+0x1b/0x1b0 [ 1358.671349][ C1] irq_exit+0x180/0x1d0 [ 1358.675535][ C1] smp_apic_timer_interrupt+0x14a/0x570 [ 1358.681093][ C1] apic_timer_interrupt+0xf/0x20 [ 1358.686285][ C1] [ 1358.689222][ C1] RIP: 0010:unwind_next_frame.part.0+0x0/0xa20 [ 1358.695367][ C1] Code: 00 00 48 8b 45 d0 65 48 33 04 25 28 00 00 00 75 12 48 81 c4 e0 00 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 32 70 12 00 66 90 <55> 4c 8d 4f 58 48 b8 00 00 00 00 00 fc ff df 48 89 e5 41 57 41 56 [ 1358.714955][ C1] RSP: 0018:ffff88805b7a7430 EFLAGS: 00000202 ORIG_RAX: ffffffffffffff13 [ 1358.723355][ C1] RAX: 0000000000000000 RBX: ffff88805b7a74f8 RCX: 0000000000000009 [ 1358.731310][ C1] RDX: 0000000000000001 RSI: ffffffff81941344 RDI: ffff88805b7a7450 [ 1358.739267][ C1] RBP: ffff88805b7a7440 R08: 0000000000000001 R09: ffff88805b7a74a8 [ 1358.747220][ C1] R10: ffff88805b7a7478 R11: ffff88805b7a7488 R12: 0000000000000000 [ 1358.755175][ C1] R13: 0000000000000000 R14: ffff88805b79c680 R15: ffff88812c2d8340 [ 1358.763157][ C1] ? shmem_get_inode+0x84/0x780 [ 1358.768000][ C1] ? unwind_next_frame+0x3b/0x50 [ 1358.773009][ C1] __save_stack_trace+0x83/0x100 [ 1358.777934][ C1] ? shmem_get_inode+0x84/0x780 [ 1358.782772][ C1] save_stack_trace+0x1a/0x20 [ 1358.787431][ C1] save_stack+0x45/0xd0 [ 1358.791582][ C1] ? save_stack+0x45/0xd0 [ 1358.796601][ C1] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1358.802392][ C1] ? kasan_slab_alloc+0xf/0x20 [ 1358.807149][ C1] ? kmem_cache_alloc+0x11a/0x6f0 [ 1358.812154][ C1] ? shmem_alloc_inode+0x1c/0x50 [ 1358.817266][ C1] ? alloc_inode+0x66/0x190 [ 1358.821753][ C1] ? new_inode_pseudo+0x19/0xf0 [ 1358.826582][ C1] ? new_inode+0x1f/0x40 [ 1358.830828][ C1] ? shmem_get_inode+0x84/0x780 [ 1358.835666][ C1] ? __lockdep_free_key_range+0x120/0x120 [ 1358.841376][ C1] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 1358.846991][ C1] ? find_held_lock+0x35/0x130 [ 1358.851740][ C1] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 1358.857365][ C1] ? mark_held_locks+0xa4/0xf0 [ 1358.862118][ C1] ? kasan_unpoison_shadow+0x35/0x50 [ 1358.867386][ C1] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1358.873005][ C1] kasan_slab_alloc+0xf/0x20 [ 1358.877584][ C1] kmem_cache_alloc+0x11a/0x6f0 [ 1358.882428][ C1] ? lock_downgrade+0x880/0x880 [ 1358.887265][ C1] ? shmem_destroy_callback+0xc0/0xc0 [ 1358.892621][ C1] shmem_alloc_inode+0x1c/0x50 [ 1358.897365][ C1] alloc_inode+0x66/0x190 [ 1358.901680][ C1] new_inode_pseudo+0x19/0xf0 [ 1358.906339][ C1] new_inode+0x1f/0x40 [ 1358.910392][ C1] shmem_get_inode+0x84/0x780 [ 1358.915055][ C1] shmem_mknod+0x5a/0x1f0 [ 1358.919370][ C1] shmem_create+0x2b/0x40 [ 1358.923683][ C1] ? shmem_mkdir+0x60/0x60 [ 1358.928081][ C1] lookup_open+0x12e0/0x1b10 [ 1358.932663][ C1] ? vfs_link+0xbc0/0xbc0 [ 1358.936995][ C1] path_openat+0x14ac/0x46e0 [ 1358.941571][ C1] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1358.947355][ C1] ? kasan_slab_alloc+0xf/0x20 [ 1358.952100][ C1] ? kmem_cache_alloc+0x11a/0x6f0 [ 1358.957124][ C1] ? getname_flags+0xd6/0x5b0 [ 1358.961778][ C1] ? getname+0x1a/0x20 [ 1358.965843][ C1] ? do_sys_open+0x2c9/0x5d0 [ 1358.970428][ C1] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1358.975787][ C1] ? __lockdep_free_key_range+0x120/0x120 [ 1358.981498][ C1] ? __alloc_fd+0x430/0x530 [ 1358.985996][ C1] do_filp_open+0x1a1/0x280 [ 1358.990491][ C1] ? may_open_dev+0x100/0x100 [ 1358.995167][ C1] ? kasan_check_read+0x11/0x20 [ 1359.000014][ C1] ? do_raw_spin_unlock+0x57/0x270 [ 1359.005116][ C1] ? _raw_spin_unlock+0x2d/0x50 [ 1359.009951][ C1] ? __alloc_fd+0x430/0x530 [ 1359.014447][ C1] do_sys_open+0x3fe/0x5d0 [ 1359.018849][ C1] ? filp_open+0x80/0x80 [ 1359.023081][ C1] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1359.028530][ C1] ? do_syscall_64+0x26/0x610 [ 1359.033190][ C1] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1359.039238][ C1] ? do_syscall_64+0x26/0x610 [ 1359.043904][ C1] __x64_sys_open+0x7e/0xc0 [ 1359.048392][ C1] do_syscall_64+0x103/0x610 [ 1359.052969][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1359.058843][ C1] RIP: 0033:0x7f7c6a8cd120 [ 1359.063243][ C1] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 1359.083107][ C1] RSP: 002b:00007ffe53c8e9f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1359.091511][ C1] RAX: ffffffffffffffda RBX: 00000000017c2750 RCX: 00007f7c6a8cd120 [ 1359.099464][ C1] RDX: 00000000000001b6 RSI: 0000000000080241 RDI: 00007ffe53c8eee0 [ 1359.107417][ C1] RBP: 00007ffe53c8ea70 R08: 0000000000000004 R09: 0000000000000001 [ 1359.115645][ C1] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000004 [ 1359.123613][ C1] R13: 0000000000420721 R14: 00007ffe53c8eae0 R15: 0000000000000000 [ 1359.131679][ C1] [ 1359.133999][ C1] Allocated by task 4534: [ 1359.138326][ C1] save_stack+0x45/0xd0 [ 1359.142467][ C1] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1359.148098][ C1] kasan_slab_alloc+0xf/0x20 [ 1359.152670][ C1] kmem_cache_alloc+0x11a/0x6f0 [ 1359.157515][ C1] ccid_new+0x256/0x3f0 [ 1359.161664][ C1] dccp_hdlr_ccid+0x27/0x150 [ 1359.166235][ C1] __dccp_feat_activate+0x17a/0x270 [ 1359.171426][ C1] dccp_feat_activate_values+0x33a/0x766 [ 1359.177051][ C1] dccp_rcv_state_process+0x116f/0x1935 [ 1359.182581][ C1] dccp_v6_do_rcv+0x269/0xbf0 [ 1359.187240][ C1] __release_sock+0x12e/0x3a0 [ 1359.191896][ C1] release_sock+0x59/0x1c0 [ 1359.196344][ C1] __inet_stream_connect+0x59f/0xea0 [ 1359.201787][ C1] inet_stream_connect+0x58/0xa0 [ 1359.206796][ C1] __sys_connect+0x266/0x330 [ 1359.211370][ C1] __x64_sys_connect+0x73/0xb0 [ 1359.216133][ C1] do_syscall_64+0x103/0x610 [ 1359.220712][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1359.226587][ C1] [ 1359.228898][ C1] Freed by task 4534: [ 1359.232871][ C1] save_stack+0x45/0xd0 [ 1359.237010][ C1] __kasan_slab_free+0x102/0x150 [ 1359.241930][ C1] kasan_slab_free+0xe/0x10 [ 1359.246434][ C1] kmem_cache_free+0x86/0x260 [ 1359.251189][ C1] ccid_hc_tx_delete+0xc1/0x100 [ 1359.256114][ C1] dccp_hdlr_ccid+0x7d/0x150 [ 1359.260705][ C1] __dccp_feat_activate+0x17a/0x270 [ 1359.265891][ C1] dccp_feat_activate_values+0x33a/0x766 [ 1359.272573][ C1] dccp_create_openreq_child+0x40c/0x570 [ 1359.278191][ C1] dccp_v6_request_recv_sock+0x214/0x1da0 [ 1359.283979][ C1] dccp_check_req+0x35c/0x6f0 [ 1359.288635][ C1] dccp_v6_rcv+0x6d7/0x191e [ 1359.293122][ C1] ip6_protocol_deliver_rcu+0x303/0x16c0 [ 1359.300309][ C1] ip6_input_finish+0x84/0x170 [ 1359.305152][ C1] ip6_input+0xe4/0x3f0 [ 1359.309291][ C1] ip6_rcv_finish+0x1e7/0x320 [ 1359.313950][ C1] ipv6_rcv+0x10e/0x420 [ 1359.318087][ C1] __netif_receive_skb_one_core+0x115/0x1a0 [ 1359.323960][ C1] __netif_receive_skb+0x2c/0x1c0 [ 1359.328977][ C1] process_backlog+0x206/0x750 [ 1359.333732][ C1] net_rx_action+0x4fa/0x1070 [ 1359.338391][ C1] __do_softirq+0x266/0x95a [ 1359.342869][ C1] [ 1359.345194][ C1] The buggy address belongs to the object at ffff8880a8aa5680 [ 1359.345194][ C1] which belongs to the cache ccid2_hc_tx_sock of size 1240 [ 1359.359922][ C1] The buggy address is located 0 bytes inside of [ 1359.359922][ C1] 1240-byte region [ffff8880a8aa5680, ffff8880a8aa5b58) [ 1359.373085][ C1] The buggy address belongs to the page: [ 1359.378706][ C1] page:ffffea0002a2a900 count:1 mapcount:0 mapping:ffff8882166d8e40 index:0x0 compound_mapcount: 0 [ 1359.389457][ C1] flags: 0x1fffc0000010200(slab|head) [ 1359.394819][ C1] raw: 01fffc0000010200 ffff88809ac34848 ffff88809ac34848 ffff8882166d8e40 [ 1359.404514][ C1] raw: 0000000000000000 ffff8880a8aa4080 0000000100000005 0000000000000000 [ 1359.413093][ C1] page dumped because: kasan: bad access detected [ 1359.419492][ C1] [ 1359.421804][ C1] Memory state around the buggy address: [ 1359.427418][ C1] ffff8880a8aa5580: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc [ 1359.435463][ C1] ffff8880a8aa5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1359.443519][ C1] >ffff8880a8aa5680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1359.451563][ C1] ^ [ 1359.455625][ C1] ffff8880a8aa5700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1359.463672][ C1] ffff8880a8aa5780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1359.471734][ C1] ================================================================== [ 1359.479779][ C1] Disabling lock debugging due to kernel taint 14:55:37 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400060003000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000600)=""/169, 0xa9}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/218, 0xda}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000980)=""/200, 0xc8}], 0x6, 0x0, 0x0, 0x0}, 0x0) [ 1359.486039][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 1359.492645][ C1] CPU: 1 PID: 7664 Comm: udevd Tainted: G B 5.0.0+ #21 [ 1359.500794][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1359.510931][ C1] Call Trace: [ 1359.514207][ C1] [ 1359.517090][ C1] dump_stack+0x172/0x1f0 [ 1359.521534][ C1] panic+0x2cb/0x65c [ 1359.525450][ C1] ? __warn_printk+0xf3/0xf3 [ 1359.530059][ C1] ? retint_kernel+0x2d/0x2d [ 1359.534644][ C1] ? trace_hardirqs_on+0x5e/0x230 [ 1359.539692][ C1] ? ccid_hc_tx_delete+0xde/0x100 [ 1359.544875][ C1] end_report+0x47/0x4f [ 1359.549015][ C1] ? ccid_hc_tx_delete+0xde/0x100 [ 1359.554023][ C1] kasan_report.cold+0xe/0x40 [ 1359.558691][ C1] ? ccid_hc_tx_delete+0xde/0x100 [ 1359.563721][ C1] __asan_report_load8_noabort+0x14/0x20 [ 1359.569339][ C1] ccid_hc_tx_delete+0xde/0x100 [ 1359.574179][ C1] dccp_sk_destruct+0x3f/0x90 [ 1359.578839][ C1] ? dccp_init_sock+0x3f0/0x3f0 [ 1359.583677][ C1] __sk_destruct+0x55/0x6d0 [ 1359.588171][ C1] ? proto_unregister+0x4e0/0x4e0 [ 1359.593274][ C1] rcu_core+0x928/0x1390 [ 1359.597507][ C1] ? rcu_check_gp_start_stall+0x250/0x250 [ 1359.603226][ C1] __do_softirq+0x266/0x95a [ 1359.607715][ C1] ? sched_clock_cpu+0x1b/0x1b0 [ 1359.612556][ C1] irq_exit+0x180/0x1d0 [ 1359.616697][ C1] smp_apic_timer_interrupt+0x14a/0x570 [ 1359.622233][ C1] apic_timer_interrupt+0xf/0x20 [ 1359.627152][ C1] [ 1359.630088][ C1] RIP: 0010:unwind_next_frame.part.0+0x0/0xa20 [ 1359.636230][ C1] Code: 00 00 48 8b 45 d0 65 48 33 04 25 28 00 00 00 75 12 48 81 c4 e0 00 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 32 70 12 00 66 90 <55> 4c 8d 4f 58 48 b8 00 00 00 00 00 fc ff df 48 89 e5 41 57 41 56 [ 1359.655856][ C1] RSP: 0018:ffff88805b7a7430 EFLAGS: 00000202 ORIG_RAX: ffffffffffffff13 [ 1359.664262][ C1] RAX: 0000000000000000 RBX: ffff88805b7a74f8 RCX: 0000000000000009 [ 1359.672224][ C1] RDX: 0000000000000001 RSI: ffffffff81941344 RDI: ffff88805b7a7450 [ 1359.680482][ C1] RBP: ffff88805b7a7440 R08: 0000000000000001 R09: ffff88805b7a74a8 [ 1359.688483][ C1] R10: ffff88805b7a7478 R11: ffff88805b7a7488 R12: 0000000000000000 [ 1359.696464][ C1] R13: 0000000000000000 R14: ffff88805b79c680 R15: ffff88812c2d8340 [ 1359.704445][ C1] ? shmem_get_inode+0x84/0x780 [ 1359.709337][ C1] ? unwind_next_frame+0x3b/0x50 [ 1359.714976][ C1] __save_stack_trace+0x83/0x100 [ 1359.719908][ C1] ? shmem_get_inode+0x84/0x780 [ 1359.724762][ C1] save_stack_trace+0x1a/0x20 [ 1359.730042][ C1] save_stack+0x45/0xd0 [ 1359.734192][ C1] ? save_stack+0x45/0xd0 [ 1359.738595][ C1] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1359.744386][ C1] ? kasan_slab_alloc+0xf/0x20 [ 1359.749134][ C1] ? kmem_cache_alloc+0x11a/0x6f0 [ 1359.754284][ C1] ? shmem_alloc_inode+0x1c/0x50 [ 1359.759262][ C1] ? alloc_inode+0x66/0x190 [ 1359.763753][ C1] ? new_inode_pseudo+0x19/0xf0 [ 1359.768619][ C1] ? new_inode+0x1f/0x40 [ 1359.772847][ C1] ? shmem_get_inode+0x84/0x780 [ 1359.777693][ C1] ? __lockdep_free_key_range+0x120/0x120 [ 1359.783397][ C1] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 1359.789139][ C1] ? find_held_lock+0x35/0x130 [ 1359.793903][ C1] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 1359.799444][ C1] ? mark_held_locks+0xa4/0xf0 [ 1359.804300][ C1] ? kasan_unpoison_shadow+0x35/0x50 [ 1359.809578][ C1] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1359.815238][ C1] kasan_slab_alloc+0xf/0x20 [ 1359.819826][ C1] kmem_cache_alloc+0x11a/0x6f0 [ 1359.824682][ C1] ? lock_downgrade+0x880/0x880 [ 1359.829540][ C1] ? shmem_destroy_callback+0xc0/0xc0 [ 1359.834908][ C1] shmem_alloc_inode+0x1c/0x50 [ 1359.839696][ C1] alloc_inode+0x66/0x190 [ 1359.844022][ C1] new_inode_pseudo+0x19/0xf0 [ 1359.848689][ C1] new_inode+0x1f/0x40 [ 1359.852788][ C1] shmem_get_inode+0x84/0x780 [ 1359.857470][ C1] shmem_mknod+0x5a/0x1f0 [ 1359.861802][ C1] shmem_create+0x2b/0x40 [ 1359.866118][ C1] ? shmem_mkdir+0x60/0x60 [ 1359.870695][ C1] lookup_open+0x12e0/0x1b10 [ 1359.875276][ C1] ? vfs_link+0xbc0/0xbc0 [ 1359.879636][ C1] path_openat+0x14ac/0x46e0 [ 1359.884251][ C1] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1359.890046][ C1] ? kasan_slab_alloc+0xf/0x20 [ 1359.894797][ C1] ? kmem_cache_alloc+0x11a/0x6f0 [ 1359.899806][ C1] ? getname_flags+0xd6/0x5b0 [ 1359.904478][ C1] ? getname+0x1a/0x20 [ 1359.908534][ C1] ? do_sys_open+0x2c9/0x5d0 [ 1359.913117][ C1] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1359.918485][ C1] ? __lockdep_free_key_range+0x120/0x120 [ 1359.924197][ C1] ? __alloc_fd+0x430/0x530 [ 1359.928692][ C1] do_filp_open+0x1a1/0x280 [ 1359.933183][ C1] ? may_open_dev+0x100/0x100 [ 1359.937857][ C1] ? kasan_check_read+0x11/0x20 [ 1359.942698][ C1] ? do_raw_spin_unlock+0x57/0x270 [ 1359.947809][ C1] ? _raw_spin_unlock+0x2d/0x50 [ 1359.953085][ C1] ? __alloc_fd+0x430/0x530 [ 1359.957590][ C1] do_sys_open+0x3fe/0x5d0 [ 1359.961998][ C1] ? filp_open+0x80/0x80 [ 1359.966235][ C1] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1359.971805][ C1] ? do_syscall_64+0x26/0x610 [ 1359.976478][ C1] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1359.982533][ C1] ? do_syscall_64+0x26/0x610 [ 1359.987211][ C1] __x64_sys_open+0x7e/0xc0 [ 1359.991709][ C1] do_syscall_64+0x103/0x610 [ 1359.996295][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1360.002177][ C1] RIP: 0033:0x7f7c6a8cd120 [ 1360.006613][ C1] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 1360.026257][ C1] RSP: 002b:00007ffe53c8e9f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1360.034688][ C1] RAX: ffffffffffffffda RBX: 00000000017c2750 RCX: 00007f7c6a8cd120 [ 1360.042647][ C1] RDX: 00000000000001b6 RSI: 0000000000080241 RDI: 00007ffe53c8eee0 [ 1360.050607][ C1] RBP: 00007ffe53c8ea70 R08: 0000000000000004 R09: 0000000000000001 [ 1360.058568][ C1] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000004 [ 1360.066617][ C1] R13: 0000000000420721 R14: 00007ffe53c8eae0 R15: 0000000000000000 [ 1360.075906][ C1] Kernel Offset: disabled [ 1360.080247][ C1] Rebooting in 86400 seconds..