0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:18:57 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) utimensat(r0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)={{0x77359400}, {r1, r2/1000+10000}}, 0x100) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 05:18:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:18:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 05:18:57 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:18:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) [ 312.762043] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 312.768661] reason=80000021 qualification=0000000000000000 [ 312.775020] IDTVectoring: info=00000000 errcode=00000000 [ 312.780451] TSC Offset = 0xffffff56b4ee185f [ 312.784822] EPT pointer = 0x000000008e5ca01e 05:18:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 05:18:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2d00000000000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:18:57 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x2, 0x0) [ 312.873251] overlayfs: filesystem on './file0' not supported as upperdir 05:18:57 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 312.943773] *** Guest State *** [ 312.947192] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 05:18:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) [ 312.991245] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 05:18:57 executing program 2: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[], &(0x7f0000000300)='ppp0\x00', 0x5, 0x0) sync_file_range(r0, 0x0, 0x1000001000, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x20000000) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x8) setsockopt$inet6_int(r3, 0x29, 0x33, &(0x7f0000000040)=0x100000000001f, 0x87) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)={'ifb0\x00', {0x2, 0x0, @dev}}) setsockopt$nfc_llcp_NFC_LLCP_RW(0xffffffffffffffff, 0x118, 0x0, &(0x7f0000000140)=0x1, 0x4) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0xe803000000000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000280), &(0x7f00000002c0)=0x4) mknod(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffc, 0x0) [ 313.140669] CR3 = 0x0000000000000000 [ 313.167441] overlayfs: filesystem on './file0' not supported as upperdir [ 313.179313] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 313.211648] RFLAGS=0x00010002 DR7 = 0x0000000000000400 [ 313.244598] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 313.290798] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 313.311873] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 313.322705] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 313.354103] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 313.386127] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 313.413992] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 313.423132] GDTR: limit=0x00000000, base=0x0000000000000000 [ 313.459058] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 313.467454] IDTR: limit=0x00000000, base=0x0000000000000000 [ 313.491371] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 313.529665] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 313.540111] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 313.561022] Interruptibility = 00000000 ActivityState = 00000000 [ 313.573803] *** Host State *** [ 313.577039] RIP = 0xffffffff811f8d10 RSP = 0xffff888055c7f590 [ 313.586744] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 313.593183] FSBase=00007fd733fc1700 GSBase=ffff8880ae600000 TRBase=fffffe0000033000 [ 313.608054] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 313.621181] CR0=0000000080050033 CR3=000000008d322000 CR4=00000000001426f0 [ 313.628437] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 313.635509] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 313.641667] *** Control State *** [ 313.645598] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 313.652361] EntryControls=0000d1ff ExitControls=002fefff [ 313.659089] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 313.666425] VMEntry: intr_info=80000306 errcode=00000000 ilen=00000000 [ 313.673202] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 05:18:58 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:18:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:18:58 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:18:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x200000, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f00000000c0)={0xff, 0x6, 0x3}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='bond_slave_1\x00', 0x10) 05:18:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x4800000000000000, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:18:58 executing program 2: r0 = geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000001c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in=@multicast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000300)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x10000, &(0x7f0000000480)={[{@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x8000}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0xffffffff7fffffff}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0xfffffffffffff171}}], [{@dont_measure='dont_measure'}, {@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, '+procppp0'}}, {@permit_directio='permit_directio'}, {@euid_gt={'euid>', r1}}, {@fowner_lt={'fowner<', r2}}, {@obj_type={'obj_type', 0x3d, 'wlan0-cgroupVbdev'}}, {@fowner_lt={'fowner<', r3}}, {@hash='hash'}]}) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000680)='/dev/autofs\x00', 0x0, 0x0) [ 313.680267] reason=80000021 qualification=0000000000000000 [ 313.686741] IDTVectoring: info=00000000 errcode=00000000 [ 313.692195] TSC Offset = 0xffffff5657c082e9 [ 313.696606] EPT pointer = 0x0000000088ee401e 05:18:58 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x20) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) 05:18:58 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x8000, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000080)=0x200) [ 313.800732] overlayfs: filesystem on './file0' not supported as upperdir 05:18:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfdffffff, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:18:58 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:18:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x6000000000000000, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:18:58 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 05:18:58 executing program 2: mknod(&(0x7f0000000080)='./file0\x00', 0x1000000009810, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40, 0x0) sendmsg(r0, &(0x7f0000001c40)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e21, @local}, 0x4, 0x4, 0x2, 0x4}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000140)="6859212343bbb3950a214ffc4369fc666f74d6f9625bffc9fe64a99f3abfc3eb70521cc74b3ba21f619b9541cd69727915518a358f894bafea8e2ae4489248a17f5cb80d31bbe5648c448bf2b10e946cb99b80437d32dddc990be48d85b35b368cbaa85fb9a74cd3a3b4dc12335ecd7b359d5817cf73b7499d2d17bf491c942ae60f10479ec325a5f3780ce4bc13d3acf57a349454280ca0dbdd6f2c218eb5d6a296bac2fe68d5dabe4cbf6421311dce957eaf0f22f9bbbb8b3649d99b0489cb4dcb", 0xc2}, {&(0x7f0000000240)="e99d387eff98f11c5a6e82057554982c7d5bbcee84ac9509dd5685ec6ab44e1bbd24badfe71efc261fed59344ac6f994e63c33f5858e56820a9f2f7b34f3b71d3316722147ff959121e839da9895effa643b4548a3031b783dde95af890cab201a5f3d4d8058d3299c4f8ad9a9511b8c2553ae726b4f73332c5a1874ed1ee7b746270fc2e398f62e2ff7934d86dfbd5e5f6baa97027362b6cc64a457109fa39e4f4f74610f957f387fcb0bec0825ea9dde300cca502504d32da95ed20c49a69a8615908261c01f33e5216a45cbb88156f60eb53a17c4ba567ab5dc953934b900bed6401bfd3de4b3136c962d686671b6a335a3de81", 0xf5}, {&(0x7f0000000340)="6ae9f4b112adbee4548ea8a6f21a7ec7e7dc6d17f079d66a04bb275f17cff27a79e04b807f5669164cfe926c89b32771d737ac0462e6aa9591063a8fa33c82dbee648f017334bca49ad469ec2666a098e96748b81a34035db49807e017", 0x5d}, {&(0x7f0000000040)="816c693f1cc4f16cd07f5172a81c79a6b4a3e1c86424c827e351c4aa2b2ccc57a96ee5d34cc679354608eb752d14edae7a21bd4797ddd5df", 0x38}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f00000013c0)="7f51e85d39cd0f7364f31fbd42c4059bea0ddcdda3f3625e0ffaf5961014b56600c8db26517e3be71e70fc49bd5c3fc4748c8a21e6bcfd2a1979ac3bbb58dd0d6ca5648e2df0f0e7a6f918d81f0058a3dd17ea6a9601f02cbd3f8523035f867533f1d70a554bb64d39dfc58c55bc59b927d66892e90edc03ffcd7780c6fceab0af1ccf9eb053ff45b94132eee44a752319dcab78efb5a9bc4b875b182a6e96c971628acef44bb31e7985905be747ba4b025f3c03b99f5e546a6660", 0xbb}, {&(0x7f0000001480)="db064bdf3427d7bb212e86a6", 0xc}, {&(0x7f00000014c0)="bff5c03f5565a9efa37619c260e03baa2ca07c7cd9919cba932dc43cf894f208c77eb7eb0ef2aff735437e83c057074a30fbab9db4d35e29b2c7c6c800c218fa6d409f6699247ee079e16a7e3ac299cc996ab88e0467e610bdf406", 0x5b}, {&(0x7f0000001540)="4d2ddd025450ba01ef81b13dc214d1a07746b196cb43380a13ad5b35395757439930d9f58c5f011039e6c32bd6488815880896a3a6d5bf2c81a6045bdd4ae01ef1f726f59a4746fe76e8f11be1e25c4762e9a5641a003fb6e195f0c363", 0x5d}, {&(0x7f00000015c0)="7888aafcb63b95a550f13dc9ed492af6c1d898c7ed4664acf09287852f3dd297b7a25e853b9c1196043d7421c78d7f85480636221ba04a043183a92503897154eea85eca", 0x44}], 0xa, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x518}, 0x4) 05:18:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x700, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:18:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)) [ 314.143310] overlayfs: filesystem on './file0' not supported as upperdir 05:18:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x900, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:18:59 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f00000000c0)="bb05b2d907f0", 0x6, 0x8000}, {&(0x7f0000000100)="fe0257eb16310865b19405b48ea35f085c4ba5f084cba63dec83693c708aa346f2a4bf533a86f0b68d32b01682e28d89506797edd70807210f80cfdfa775d1286e14a4fca25adb94a6863d237fb64839ee50e1fb699c2a2007cf1388f3aec20559b7f4607dc5f23569a61c3535f98323c1121db11adfe5f0903a5a9857", 0x7d, 0x2}, {&(0x7f0000000180)="7d9edd59588fae159f28daa64daf5017491a9e4c98d68fdc1567a3ebdcdba788f135e414e08b62dd799a66ee84918d68f3ce1b5da6b28b6f32304b727d284ed8744f3cf4b1ff013bfed9ae52c7b7a807f9abc0bb97c07ba2d4a3612f94e41965262ca83cf43d4b93", 0x68, 0xff}], 0x2005800, &(0x7f0000000400)=ANY=[@ANYBLOB="706172743d3078303030303030303030303030376666662c6465636f6d706f73652c73657373696f6e3d3078303030303030303030303030303030382c9f6f4a7911c1d290706172743d3078303030303030303030303030303030322c7365636c6162656c2c657569643e", @ANYRESDEC=r0, @ANYBLOB=',\x00']) [ 314.203125] *** Guest State *** [ 314.218085] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 05:18:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffdfc, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:18:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x8) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) setrlimit(0xb, &(0x7f0000000080)={0x1ff, 0x6}) 05:18:59 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 314.259970] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 314.337715] CR3 = 0x0000000000000000 05:18:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x4000fd) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) 05:18:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1800000000000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) [ 314.368046] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 314.383773] RFLAGS=0x00010002 DR7 = 0x0000000000000400 [ 314.402935] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 314.420216] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 314.422224] overlayfs: filesystem on './file0' not supported as upperdir 05:18:59 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 314.492172] EXT4-fs: 17 callbacks suppressed [ 314.492186] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 314.516350] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 314.542205] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 314.553066] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 314.565682] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 314.582255] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 314.597727] GDTR: limit=0x00000000, base=0x0000000000000000 [ 314.605889] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 314.649780] overlayfs: filesystem on './file0' not supported as upperdir [ 314.667577] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 314.686416] IDTR: limit=0x00000000, base=0x0000000000000000 [ 314.712433] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 314.730240] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 314.737079] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 314.744675] Interruptibility = 00000000 ActivityState = 00000000 [ 314.750901] *** Host State *** [ 314.754333] RIP = 0xffffffff811f8d10 RSP = 0xffff8880549ff590 [ 314.777540] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 314.794802] FSBase=00007fd733fc1700 GSBase=ffff8880ae700000 TRBase=fffffe0000033000 [ 314.802654] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 314.808930] CR0=0000000080050033 CR3=000000008bbe9000 CR4=00000000001426e0 [ 314.816013] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 314.822671] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 314.828768] *** Control State *** [ 314.832211] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 314.838949] EntryControls=0000d1ff ExitControls=002fefff [ 314.844443] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 314.851367] VMEntry: intr_info=80000306 errcode=00000000 ilen=00000000 [ 314.858097] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 314.864708] reason=80000021 qualification=0000000000000000 [ 314.871011] IDTVectoring: info=00000000 errcode=00000000 [ 314.876667] TSC Offset = 0xffffff55b39a3541 [ 314.880988] EPT pointer = 0x000000009a77201e 05:18:59 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) 05:18:59 executing program 2: symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 05:18:59 executing program 3: r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2f, 0x40000) getsockopt$sock_buf(r0, 0x1, 0x3d, &(0x7f0000000180)=""/99, &(0x7f00000000c0)=0x63) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) 05:18:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:18:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x4c00, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:18:59 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:18:59 executing program 2: r0 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x1, 0x2) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f00000000c0)=0xfffffffffffffffc) 05:18:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4c00, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:18:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x2800, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f00000000c0)={0x4d, 0x10001, 0xb, 0x5, 0x401, 0x81}) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000000180)={'nr0\x00', 0x100000000, 0x5}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) [ 314.977244] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 314.997688] overlayfs: filesystem on './file0' not supported as upperdir 05:18:59 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\xff', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 315.058244] *** Guest State *** [ 315.061682] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 315.079792] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 315.118454] CR3 = 0x0000000000000000 05:19:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x8280, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000580)={{}, {0x1, 0x3}, [{0x2, 0x1, r0}, {0x2, 0x1, r0}, {0x2, 0x3, r0}, {0x2, 0x4, r0}, {0x2, 0x1, r0}, {0x2, 0x7, r0}, {0x2, 0x6, r0}], {0x4, 0x5}, [{0x8, 0x7, r1}, {0x8, 0x2, r1}, {0x8, 0x1, r1}, {0x8, 0x0, r1}, {0x8, 0xc7f4286a41a379f3, r1}], {0x10, 0x1}, {0x20, 0x5}}, 0x84, 0x3) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f00000001c0)={0x4, 0x7, 0x6, 0x0, 0x0, [{r2, 0x0, 0xe}, {r2, 0x0, 0x3e}, {r2, 0x0, 0x7f}, {r2, 0x0, 0x7}, {r2, 0x0, 0x3}, {r2, 0x0, 0x6f}]}) setsockopt(r2, 0x2, 0x43b2747e, &(0x7f00000002c0)="22a7fbdc87605141158655f3438837010d1fac64df0ea86c0ebc28ee69f97ec37013e9d447c0b80c9e1b925290888f3f3e67f86fead9a6e6fe339fcace7d8cf04ce2cadf887db43ff464816dd3da94333dd2a62543f00688ee777aca066b492ba9205197b08f3df1dbdc05efb75b8a8bcd66f196ba7866a6180d934350cee9406845f7b624a277db2a0a8192be11d56ecbd6af10780a33e9371724518c8f715137650992ffb9ff33dab03d17cf5bfeeab652b7dcbc23228090d9874995dbaf02da3822795e4ce71e313612cc9ed069386a72ee656b00a36fc5151c29095d62d7a48cf2bcd1f0b8e6028ec07c41bb01ba0e4cc72cbfce73db", 0xf8) 05:19:00 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000000180)=0xfffffffffffffff9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) chown(&(0x7f0000000040)='./file0\x00', r0, r1) [ 315.151582] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 315.210898] RFLAGS=0x00010002 DR7 = 0x0000000000000400 [ 315.257604] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 315.279162] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 315.309884] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 315.346828] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 315.375844] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 315.389850] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 315.400482] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 315.410161] GDTR: limit=0x00000000, base=0x0000000000000000 [ 315.418617] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 315.427123] IDTR: limit=0x00000000, base=0x0000000000000000 [ 315.435502] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 315.443798] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 315.450233] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 315.458093] Interruptibility = 00000000 ActivityState = 00000000 [ 315.464392] *** Host State *** [ 315.467582] RIP = 0xffffffff811f8d10 RSP = 0xffff88805268f590 [ 315.473608] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 315.480009] FSBase=00007fd733fc1700 GSBase=ffff8880ae600000 TRBase=fffffe0000003000 [ 315.487891] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 315.493816] CR0=0000000080050033 CR3=000000008ff48000 CR4=00000000001426f0 [ 315.500837] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 315.507906] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 315.514129] *** Control State *** [ 315.517583] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 05:19:00 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) 05:19:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x60, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf0f, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:00 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x4000, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000001340)={'sit0\x00', {0x2, 0x4e21, @empty}}) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x20000, 0x0) recvmsg(r1, &(0x7f0000001300)={&(0x7f0000000080)=@tipc, 0x80, &(0x7f0000001240)=[{&(0x7f0000000100)}, {&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001140)=""/253, 0xfd}], 0x3, &(0x7f0000001280)=""/68, 0x44}, 0x40) 05:19:00 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x18}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x80000000000000) r0 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f00000002c0)) r1 = socket$isdn_base(0x22, 0x3, 0x0) accept(r1, &(0x7f0000000180)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, &(0x7f0000000040)=0x80) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) mount(&(0x7f00000000c0)=@sr0='/dev/sr0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='mqueue\x00', 0x4, &(0x7f0000000280)='wlan0,\x00') lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) 05:19:00 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 315.524318] EntryControls=0000d1ff ExitControls=002fefff [ 315.529766] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 315.536721] VMEntry: intr_info=80000306 errcode=00000000 ilen=00000000 [ 315.543428] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 315.550000] reason=80000021 qualification=0000000000000000 [ 315.556380] IDTVectoring: info=00000000 errcode=00000000 [ 315.561823] TSC Offset = 0xffffff5537d2e0be [ 315.566193] EPT pointer = 0x000000009582301e [ 315.626549] mqueue: Unknown parameter 'wlan0' 05:19:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1f00000000000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:00 executing program 2: mknod(&(0x7f0000000040)='./file0\x00', 0x810, 0x5ce) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 315.649582] mqueue: Unknown parameter 'wlan0' [ 315.653944] overlayfs: filesystem on './file0' not supported as upperdir [ 315.673487] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:19:00 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a73ff0)='/dev/sequencer2\x00', 0x8203, 0x0) write$sndseq(r1, &(0x7f0000000000)=[{0x5b93, 0x0, 0xffffffffffffff80, 0x0, @tick, {}, {}, @connect}], 0x30) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) r2 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x0, 0x2) ioctl$SIOCX25SDTEFACILITIES(r2, 0x89eb, &(0x7f00000000c0)={0x2, 0x8001, 0x8001, 0x20, 0x7fff, 0x1e, 0xb, "2eebd40edf7ee96f3a43c9698dfb9f2f9d285751", "00b95014e104e8b835603e56ac65696c3dde3fde"}) r3 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f00000002c0)={0x5, 0x7fffffff, 0x80000001, 0x65, &(0x7f0000000200)=""/101, 0x6, &(0x7f0000000180)=""/6, 0x0, &(0x7f0000000280)}) connect$caif(r3, &(0x7f00000001c0)=@rfm={0x25, 0x6, "bd3bbf586fa6f84af8a3acf9cdceb5b3"}, 0x18) [ 315.729609] *** Guest State *** [ 315.737094] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 315.748315] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 315.757390] CR3 = 0x0000000000000000 [ 315.761108] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 315.761122] RFLAGS=0x00010002 DR7 = 0x0000000000000400 [ 315.761139] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 315.761150] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 315.761168] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 315.810406] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 315.820100] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 315.860725] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 315.872628] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:19:00 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)=0x0) capset(&(0x7f0000000080)={0x20080522, r0}, &(0x7f00000000c0)={0xffff, 0xff, 0x1, 0x800, 0x0, 0x5}) 05:19:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfdffffff00000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) [ 315.922961] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 315.949134] overlayfs: filesystem on './file0' not supported as upperdir [ 315.957564] GDTR: limit=0x00000000, base=0x0000000000000000 [ 315.979723] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 315.997265] IDTR: limit=0x00000000, base=0x0000000000000000 [ 316.012654] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 316.036422] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 316.062975] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 316.078905] Interruptibility = 00000000 ActivityState = 00000000 [ 316.086132] *** Host State *** [ 316.089461] RIP = 0xffffffff811f8d10 RSP = 0xffff888052457590 [ 316.095936] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 316.102510] FSBase=00007fd733fc1700 GSBase=ffff8880ae700000 TRBase=fffffe0000033000 [ 316.149210] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 316.170837] CR0=0000000080050033 CR3=000000008d02b000 CR4=00000000001426e0 [ 316.178635] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 316.186629] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 316.192782] *** Control State *** [ 316.196843] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 316.203560] EntryControls=0000d1ff ExitControls=002fefff [ 316.209014] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 316.216895] VMEntry: intr_info=80000306 errcode=00000000 ilen=00000000 [ 316.223634] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 316.230208] reason=80000021 qualification=0000000000000000 [ 316.236613] IDTVectoring: info=00000000 errcode=00000000 [ 316.242058] TSC Offset = 0xffffff54db59d7b4 05:19:01 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) 05:19:01 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x05', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x1) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000180)=""/75, &(0x7f00000000c0)=0x4b) 05:19:01 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x2) socketpair(0x4, 0x5, 0x8, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000080)=0x7) r2 = dup2(r0, r1) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f00000000c0)=0xffffffff00000000) 05:19:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x1200000000000000, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfcfdffff00000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) [ 316.246466] EPT pointer = 0x000000009132101e 05:19:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x18000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) [ 316.348388] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:19:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x100, 0x40) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000400)={{{@in6, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@initdev}}, &(0x7f00000003c0)=0xd8) chown(&(0x7f0000000080)='./file0\x00', r2, r0) 05:19:01 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x2000, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0x2a8) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000100), 0x4) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x800, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f0000000200)={0x7, {0x2, 0x7fffffff, 0x2, 0x8}}) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000040)={'eql\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) 05:19:01 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 316.412718] *** Guest State *** [ 316.427044] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 316.441025] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 316.493709] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, [ 316.504300] CR3 = 0x0000000000000000 [ 316.508043] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 05:19:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x300, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:01 executing program 2: r0 = getgid() syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x800, 0x3, &(0x7f0000001180)=[{&(0x7f00000000c0)="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", 0x1000, 0x401}, {&(0x7f00000010c0)="68dd9d5060e773a4137ff4ceb1b75cd28239b1a954a80a743f502d96b6e5c05bf4af90427791e6a3eed679791280000bb700c561c7c41ef28de991137c7c65761f2c4aa0adc78c78278efc44af8e9e", 0x4f, 0x2fa1}, {&(0x7f0000001140)="2292ea7e1ed7933a01415c094cb58296c9dce139f941b575c1e21e018a8d66d52dffe532ab93ac1acfab47d34e199941014202918d", 0x35, 0x1}], 0x800, &(0x7f0000001200)={[{@part={'part', 0x3d, 0x6}}, {@umask={'umask', 0x3d, 0x10001}}, {@gid={'gid', 0x3d, r0}}, {@creator={'creator', 0x3d, "acce81d8"}}, {@quiet='quiet'}], [{@dont_appraise='dont_appraise'}, {@audit='audit'}]}) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 316.555488] RFLAGS=0x00010002 DR7 = 0x0000000000000400 [ 316.562023] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 316.571527] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 316.582266] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 316.588738] overlayfs: filesystem on './file0' not supported as upperdir [ 316.591061] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 316.673184] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 316.730620] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 316.753563] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 316.758473] hfs: unable to parse mount options [ 316.783904] GDTR: limit=0x00000000, base=0x0000000000000000 [ 316.835860] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 316.852769] IDTR: limit=0x00000000, base=0x0000000000000000 [ 316.864407] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 316.872679] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 316.879720] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 316.888555] Interruptibility = 00000000 ActivityState = 00000000 [ 316.901738] *** Host State *** [ 316.922641] RIP = 0xffffffff811f8d10 RSP = 0xffff8880511cf590 [ 316.936003] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 316.952285] FSBase=00007fd733fc1700 GSBase=ffff8880ae600000 TRBase=fffffe0000033000 [ 316.961820] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 316.968523] CR0=0000000080050033 CR3=000000008bcf8000 CR4=00000000001426f0 [ 316.983904] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 316.990798] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 317.012376] *** Control State *** [ 317.022489] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 317.032609] EntryControls=0000d1ff ExitControls=002fefff [ 317.052836] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 317.060622] VMEntry: intr_info=80000306 errcode=00000000 ilen=00000000 [ 317.077705] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 317.087804] reason=80000021 qualification=0000000000000000 [ 317.108053] IDTVectoring: info=00000000 errcode=00000000 [ 317.113990] TSC Offset = 0xffffff547e53edfb [ 317.124966] EPT pointer = 0x00000000a49e701e 05:19:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$TIOCCONS(r1, 0x541d) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) syz_mount_image$ntfs(&(0x7f0000000200)='ntfs\x00', &(0x7f0000000240)='./file1\x00', 0x80, 0x6, &(0x7f0000000780)=[{&(0x7f0000000280)="fa516657e2f70fe14db9642909bba93cdf4c64c7ebe603e50f44eff52848e00f0aa4cc59fc972f6eb36e0c811a17f56d0d1f3832be1abfc43988e36a06562ab681489caf0385d11a823460aacb52d67ae62a11e33d1bf14694af65c2d0811694ae7da727cb563aaf72e753192b50bf5b7468b3cdfd4d6229c5e96170fb0a5293e58f04fe1e42d6366a5c3877bdb88158c453c4a4126640fa34096192659dfa013b53a1c4c3dd01bbdcd2", 0xaa, 0xffffffffffffffff}, {&(0x7f0000000340)="6c7525ae6ce582d14302b7deea7cd58d733f9d1b494e1c33bd2526e490906044331cb394e4b7c4d4f9b9733f9966f6cfbadd898a6b032c7d0b9d06c06738191918826e0fcf9083ec77e95c1890dddd8ffb1f516d3f7b1058a7a70268254acff0cf3ff8e5d8020f398e730988a519772315cd55e7863383379c41abdc34e0c85ab9ad5de55064cff1c5b8e78483324c4dfd47edc2d19e909ef1473f7da7e00d15b0307ef5db1af13a930c79012a2b1b455f48be0df1555e9e2b2dec51e5c7d09942165fcaa62e157e505a5c45eb667681dd8f149c3b8f3d9dca35cf", 0xdb, 0x9}, {&(0x7f0000000440)="fd3d36b66ad9b0c3cd060a4de0dc3915652a288bbc1fe40e6a10971744bd20610b401d3145c9b27dfedc21c275f5f6efcdbb2a4efadec3d3dd4d087cd14eea0e1dbd4a880e0a47f4432efb71f3aaaad9b45ba32887a998f9f9099cad3a30e748679f7aeb207845aed318fc74e9636719801a1afc99185b0847be8059db5b5204ffdccc377adc0fe53f48d0c6d1f2d6946efda828b6d96f76839042fa9eadd7cfb1c9440df20cd8742262e1ff63f15027264c14532dab96b413c107e29aceddae02b559d9477a6cf34c0928a232746c92278ed728d456", 0xfffffffffffffe38, 0x9}, {&(0x7f0000000540)="7f0d4b2fc2f300994e945476cc60ef6b9cf33fae8f38599c21006b7251b3f886aeb39baad36175172108d08cf950e0c2302ac75cce58b8ebca837c15a380f178f2bf76315671bc3b22e2b49081a44595ece5ebb746ef901999e2decdbe37952b29c3f43d2fe5ef385c4ebfde2fe1ed0bd54c0850f4f3b5e5", 0x78}, {&(0x7f00000005c0)="c5b84fbc40f556d832e83cfe97f30ad800dcf5ab25685a57bd8c5ef6b34ffe8e5055d98cc7ecff9ccddc1b13e7323a55e74f9af020492be86a380135cacfd9300b040e8a2952b56dfcaf92e2b61cf738ca598b60591ccd708afea9de35899bfb187c73be37f5dd9740a594f3cca39fe57196ed2f1c42316a31ef216f5c7254f89201b46578ff91e76162ca6d256d3cb62d8e4d6232b5f5773736903f30abad284a244a5025fef3074b61dae7f0f584ff4583f6a15e7b71f2130968474e34da5e", 0xc0, 0x6}, {&(0x7f0000000680)="4af37ed7fd7e40cf9c36d73a7e8422abcf5b6650ce06754875dfd80244b65e74040e6af43f23b824ad1608b9d79079bf228d02921d5a3da87569d0ac494687ab5e8e960a4f0bb712679dfecdb4e7688012f716f7a70e2e0a4e95213d01eb439aa02070095dd3d41173834745a648f13bfa7a90b0f860efaf0ca3d15db8ad6bd239f2b12c4564c541ccdab5dec3e5cd7a3c1694a88beb53c93168b1a1f200d407ede9cfad7df631fe845f7f95f4d851f176b09baedcb14cfd7a40c39aed0be879ab4740d561b82c3925ea69962262202747c0d0d94dfd6768da64045dfe2b77c3e8830faab2a212aa", 0xe8, 0xf53}], 0x4000, &(0x7f0000000840)={[{@disable_sparse_no='disable_sparse=no'}, {@errors_recover='errors=recover'}, {@errors_continue='errors=continue'}, {@show_sys_files_no='show_sys_files=no'}, {@disable_sparse_no='disable_sparse=no'}, {@disable_sparse_yes='disable_sparse=yes'}, {@show_sys_files_yes='show_sys_files=yes'}], [{@subj_user={'subj_user', 0x3d, ','}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/dlm-control\x00'}}, {@appraise='appraise'}, {@hash='hash'}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@fowner_gt={'fowner>', r0}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_user={'subj_user', 0x3d, '/dev/dlm-control\x00'}}]}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f00000000c0), &(0x7f0000000180)=0x4) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000980)=0x7fff, 0x4) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000001c0)=""/47) 05:19:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffdfd, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:02 executing program 2: mknod(&(0x7f0000000040)='./file0\x00', 0xfffffffffffffffc, 0x5) 05:19:02 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\xff', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:02 executing program 5: [ 317.246821] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:19:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000140), 0x4) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)={[{@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0xf615}}], [{@context={'context', 0x3d, 'sysadm_u'}}]}) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 05:19:02 executing program 5: [ 317.413514] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:19:02 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:02 executing program 5: 05:19:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) [ 317.662235] overlayfs: filesystem on './file0' not supported as upperdir [ 317.767998] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000, 05:19:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) readlinkat(r0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/92, 0x5c) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="050002000000008f001b0ae93c9c463b82d62ee17357c9a120b71000000000000000000000"], 0x25, 0x1) 05:19:02 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@mcast1}}, &(0x7f0000000180)=0xe8) r1 = getgid() r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000200)=0x80) lchown(&(0x7f0000000040)='./file0\x00', r0, r1) write$P9_RSETATTR(r2, &(0x7f00000002c0)={0x7, 0x1b, 0x2}, 0x7) openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x20001, 0x0) gettid() ioctl$KDSKBMETA(r2, 0x4b63, &(0x7f0000000240)=0xfffffffffffffff9) 05:19:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:02 executing program 5: 05:19:02 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) [ 317.941141] ntfs: (device loop3): parse_options(): Unrecognized mount option subj_user. [ 317.954062] ntfs: (device loop3): parse_options(): Unrecognized mount option . [ 317.967470] ntfs: (device loop3): parse_options(): Unrecognized mount option smackfsroot. 05:19:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2d00, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:02 executing program 5: 05:19:02 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 318.054979] overlayfs: filesystem on './file0' not supported as upperdir 05:19:02 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x40, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80028000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r1, 0x0, 0x70bd2b, 0x25dfdbff, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0xfffffffffffffffb}}, ["", "", "", "", "", ""]}, 0x24}}, 0x4004) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000300)=[{&(0x7f00000001c0)=""/30, 0x1e}, {&(0x7f0000000200)=""/46, 0x2e}, {&(0x7f0000000240)=""/174, 0xae}], 0x3, 0x22) 05:19:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3f00, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:03 executing program 5: 05:19:03 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x8000, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000180)={0xfd, 0x0, [0x3, 0x3ff, 0x4, 0x4000000000000000]}) 05:19:03 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x12000000, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:03 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x2, 0x0) bind$bt_rfcomm(r0, &(0x7f0000000180)={0x1f, {0xad, 0x9, 0x2, 0x9, 0xffffffffffffffff, 0x4}, 0x7}, 0xa) mknod(&(0x7f0000000140)='./file0\x00', 0x80c0, 0x2) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x240200, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xffff}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000100)={r2, 0x2}, 0x8) [ 318.326423] overlayfs: filesystem on './file0' not supported as upperdir 05:19:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1f00, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:03 executing program 3: r0 = accept4$ax25(0xffffffffffffff9c, &(0x7f0000000080)={{}, [@bcast, @null, @rose, @null, @rose, @bcast, @null]}, &(0x7f0000000180)=0x48, 0x80800) recvmmsg(r0, &(0x7f0000006a80)=[{{&(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000240)=""/199, 0xc7}, {&(0x7f0000000340)=""/114, 0x72}, {&(0x7f00000003c0)=""/198, 0xc6}, {&(0x7f00000004c0)=""/214, 0xd6}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/4096, 0x1000}], 0x6, &(0x7f00000016c0)=""/224, 0xe0}, 0x1}, {{&(0x7f00000017c0)=@sco, 0x80, &(0x7f00000018c0)=[{&(0x7f0000001840)=""/65, 0x41}], 0x1}, 0x3}, {{0x0, 0x0, &(0x7f0000002a00)=[{&(0x7f0000001900)=""/223, 0xdf}, {&(0x7f0000001a00)=""/4096, 0x1000}], 0x2, &(0x7f0000002a40)=""/40, 0x28}, 0x7}, {{&(0x7f0000002a80)=@can, 0x80, &(0x7f0000002cc0)=[{&(0x7f0000002b00)=""/191, 0xbf}, {&(0x7f0000002bc0)=""/188, 0xbc}, {&(0x7f0000002c80)=""/29, 0x1d}], 0x3, &(0x7f0000002d00)=""/143, 0x8f}, 0xad8e}, {{0x0, 0x0, &(0x7f0000002ec0)=[{&(0x7f0000002dc0)=""/230, 0xe6}], 0x1, &(0x7f0000002f00)=""/182, 0xb6}, 0xfffffffffffff800}, {{&(0x7f0000002fc0), 0x80, &(0x7f0000004180)=[{&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/81, 0x51}, {&(0x7f00000040c0)=""/135, 0x87}], 0x3, &(0x7f00000041c0)=""/4096, 0x1000}, 0x36}, {{0x0, 0x0, &(0x7f0000005200)=[{&(0x7f00000051c0)=""/10, 0xa}], 0x1, &(0x7f0000005240)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000006240)=@llc, 0x80, &(0x7f00000068c0)=[{&(0x7f00000062c0)=""/211, 0xd3}, {&(0x7f00000063c0)=""/2, 0x2}, {&(0x7f0000006400)=""/133, 0x85}, {&(0x7f00000064c0)=""/69, 0x45}, {&(0x7f0000006540)=""/147, 0x93}, {&(0x7f0000006600)=""/9, 0x9}, {&(0x7f0000006640)=""/150, 0x96}, {&(0x7f0000006700)=""/218, 0xda}, {&(0x7f0000006800)=""/94, 0x5e}, {&(0x7f0000006880)=""/8, 0x8}], 0xa, &(0x7f0000006980)=""/240, 0xf0}, 0x1}], 0x8, 0x102, &(0x7f0000006c80)={0x0, 0x1c9c380}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) 05:19:03 executing program 5 (fault-call:15 fault-nth:0): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:03 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\xf4', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:03 executing program 2: mknod(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) 05:19:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6800, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:03 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000100)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@afid={'afid', 0x3d, 0xd}}, {@mmap='mmap'}], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'mime_typecpusetsecurityvboxnet1trustedwlan0){'}}]}}) 05:19:03 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x60, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:03 executing program 3: r0 = socket$inet(0x2, 0xa, 0x7) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000100)={0x0, @multicast1, @initdev}, &(0x7f0000000140)=0xc) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x100, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000240)={0x6, 0x4}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='./file0\x00') write(r0, &(0x7f0000000280)="de4b443862263b2590ef92b10bcd06f0f395d44941eb144be9b9c8bdea6b95044808fe55ea3b5cdc239852c074ee29c160aab64e38a6ab807a50e9b2adf583768fa42354e229803bf841a724dea93650855ac0a39f1a058ad1a1b48330902a31a090ec506279da3690d43f0346c1ef384d", 0x71) [ 318.714156] *** Guest State *** [ 318.731418] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 318.753629] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 05:19:03 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:03 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) [ 318.811203] 9pnet: p9_fd_create_tcp (13604): problem connecting socket to 127.0.0.1 [ 318.822978] syz-executor3 uses obsolete (PF_INET,SOCK_PACKET) [ 318.841693] CR3 = 0x0000000000000000 05:19:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6c, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:03 executing program 2: mknod(&(0x7f00000000c0)='\x00', 0x0, 0x6) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200840, 0x1) [ 318.882461] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 318.901617] overlayfs: filesystem on './file0' not supported as upperdir [ 318.906904] RFLAGS=0x00010002 DR7 = 0x0000000000000400 [ 318.920849] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 318.928804] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 319.012356] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 319.078676] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 319.111091] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 319.122314] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 319.130901] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 319.141388] GDTR: limit=0x00000000, base=0x0000000000000000 [ 319.149984] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 319.158001] IDTR: limit=0x00000000, base=0x0000000000000000 [ 319.166010] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 319.174030] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 319.180433] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 319.187970] Interruptibility = 00000000 ActivityState = 00000000 [ 319.194238] *** Host State *** [ 319.197435] RIP = 0xffffffff811f8d10 RSP = 0xffff888051197590 [ 319.203462] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 319.209873] FSBase=00007fd733fc1700 GSBase=ffff8880ae600000 TRBase=fffffe0000003000 [ 319.217720] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 319.223652] CR0=0000000080050033 CR3=0000000098ef9000 CR4=00000000001426f0 [ 319.230659] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 319.237354] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 319.243437] *** Control State *** [ 319.246881] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 319.253589] EntryControls=0000d1ff ExitControls=002fefff [ 319.259040] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 319.265995] VMEntry: intr_info=80000306 errcode=00000000 ilen=00000000 [ 319.272651] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 05:19:04 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:04 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:04 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xc00000000000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0xa2c0, 0x0) write$P9_RREADLINK(r0, &(0x7f00000000c0)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) 05:19:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffffd, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:04 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x9, 0x40) ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f00000001c0)=0x1) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f0000000040)) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000080)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f00000000c0)={r2, 0x80000, r1}) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000140)={0x4, 0x1}) syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x800) [ 319.279261] reason=80000021 qualification=0000000000000000 [ 319.285619] IDTVectoring: info=00000000 errcode=00000000 [ 319.291323] TSC Offset = 0xffffff53485c5cc5 [ 319.295758] EPT pointer = 0x00000000a7e4b01e 05:19:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:04 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:04 executing program 2: syz_mount_image$nfs(&(0x7f0000000000)='nfs\x00', &(0x7f0000000040)='./file0\x00', 0x6, 0x9, &(0x7f0000001740)=[{&(0x7f00000010c0)="7933a367a328be7cd4f6c3bf063f384f78af0479b10a2fd59208033d96fe32fb862a5427cd5d208efeb0ba9a5b0f88342c7770a76fba66979a80967123dc19cce6e434866581ad", 0x47, 0x6}, {&(0x7f0000001140)="1af91b668a5bd68ff7edacbcde1a64d313576f606e516b70f812bd273e976c940d712ace7b13c9887049e6547800a10abab5ec8ad07b14a06af8d17bba1de06df2c294c49556be25abae43beec6017c25e355197b2bf0e2c39d5ff857d549d33690746d68463b9f65d92cde733ef07a31d644c4d415cdac951fafdd4a2357b34ecc8c3ef367cc2090087b1e5ba9409ee67fffd8e041f96a9232de1d5a1c571e50c9a49e846348c81e67972698475c6e99faf0c0c8b", 0xb5, 0x3}, {&(0x7f0000001200)="ae92fe096822306028b12de1b02d30d0ff7faaa8428b0756c100995e80cc0f3237052a6f8a1f6c083ef64be699738242b4535a2168d3acecaba0051a10eddb77f22695745b7eedd832318e8b4539695b727cca3ae065d0f6433c6670fe2b8e4400cff3bb41bb8f3c2154f1ca56339df04fd677b8e43b2070cb8d26869f35edd04f38dafffc7dcb3a49238a02dfc21aa567184ac0938724affdccc3bbe289a453e709fc54009f17f92c42cbe2ae620ebeb5766cb3515e98fc29b9935911149f4e713cddcdd7fc39f960dbf7e21f9542185674f315127c64c27a892e6df52796ef6c0b6d5ec3d0dc", 0xe7, 0x8001}, {&(0x7f0000001300)="cc73aaf634b7dcd6374764fd598bf4883cdbdd1ba63209f4c205add36ae3f5a13361307496be606293f934aefe26f7f0648af5", 0x33, 0x1000}, {&(0x7f0000001340)="5ef280f83b4e7398b6edacd7b9655073201f3eb6272926cb4aaa16e7218511477d4a7fa132ce3f38bcd5b1913fd5594d071a2f2d1a79bb038a5915d570f54696469134918297ce26b7c8e6e363eeb2115954e4578aabe5ffec11b391183b478d1d39b584417314f3cbe362ffc0aea537f2cd7e7bb509ce64b9aeed", 0x7b, 0x8}, {&(0x7f00000013c0)="46836e4cdd10ab7000864b98b2c4f56b894c56220b79247b2d140ff24103a2f868174f12469782c4860a74747c62dbf010fd3537e1e5d8a640fa1938afda1c39e5834f83cdcb9414688e61842e9deeddee9b876aa613fe7a8e603af13dc19027722877437ffb80f37f4b509ccefece67b798d7af961d3d5aae96df55023436b00bb2846e795ca3553f023136b9b2", 0x8e, 0x52a}, {&(0x7f0000001480)="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", 0xff, 0x2}, {&(0x7f0000001580)="1cc772939568a368370fd60e39704340c2e01ac49f0808baf7844a79a73df6a3bc7dfa658e64a56e66bb4fc9d4771cb53072284fbaa2687aae8ca350e66585b2b9e34efeb90b45bd46f2fb898b2b22f56ac391bdc2d0b016f8e9811fe34365d3a2f99be477ea0fa4442449fc6b8a9c4105a188436bb283ce08df5f152631098bec1bc956de2088bfe7b31e100f8d4dbc5cdceae68408cd", 0x97, 0x8}, {&(0x7f0000001640)="c2971aef14092c641ddd27784dbf7fd3366929a3704b81e3e5b1245bab621222989d20aa43fa19695c833f6b32592d83f15c48894af3c71e6d4273a0ab86aa5bd1ec473e47c5f6abed931b7ec36054a2aa5adea40eb645eeb09c4fda9c3662cee8df31414feefb8cbd6151950e593a32323e750a63fafd3b7ba2e2c66f11007632d468350992071e0488ad77cf9b16763bc50b7415d1142581e2c915512f1ed7ab52653c25acbe33fe0bd0ee8ed486a0182ff180050caaed8c79bc1ce407d072620e88f387bcabd6962a6daf8c11421d1cec2cd427d0144f926a907aff8c6922951779f0d036098d", 0xe8, 0xc00000000}], 0x4, &(0x7f0000001840)=',\x00') r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mknod(&(0x7f0000000080)='./file0\x00', 0x421, 0xffffffff) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000001880)) sysfs$2(0x2, 0x6, &(0x7f00000000c0)=""/4096) 05:19:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) mkdir(&(0x7f0000000080)='./file0\x00', 0x2) [ 319.419034] overlayfs: filesystem on './file0' not supported as upperdir [ 319.527407] *** Guest State *** 05:19:04 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x40000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) [ 319.548656] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 319.575553] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 319.606782] CR3 = 0x0000000000000000 [ 319.612877] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 319.620753] RFLAGS=0x00010002 DR7 = 0x0000000000000400 [ 319.627194] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 319.658267] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 319.719932] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 319.737613] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 319.757667] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 319.768115] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 319.782597] overlayfs: filesystem on './file0' not supported as upperdir [ 319.794029] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 319.802547] GDTR: limit=0x00000000, base=0x0000000000000000 [ 319.821296] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 319.830008] IDTR: limit=0x00000000, base=0x0000000000000000 [ 319.851820] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 319.861182] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 319.868230] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 319.879229] Interruptibility = 00000000 ActivityState = 00000000 [ 319.893520] *** Host State *** [ 319.896856] RIP = 0xffffffff811f8d10 RSP = 0xffff88804fb0f590 [ 319.902916] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 319.910528] FSBase=00007fd733fc1700 GSBase=ffff8880ae600000 TRBase=fffffe0000033000 [ 319.918797] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 319.925228] CR0=0000000080050033 CR3=000000008c85d000 CR4=00000000001426f0 [ 319.932281] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 319.939233] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 319.945346] *** Control State *** [ 319.948791] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 319.955535] EntryControls=0000d1ff ExitControls=002fefff [ 319.961069] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 05:19:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) setsockopt$llc_int(r0, 0x10c, 0x7, &(0x7f0000000080)=0x3, 0x4) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x7) 05:19:04 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x600, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x68000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:04 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x290, 0x6) [ 319.968050] VMEntry: intr_info=80000306 errcode=00000000 ilen=00000000 [ 319.974757] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 319.981323] reason=80000021 qualification=0000000000000000 [ 319.987701] IDTVectoring: info=00000000 errcode=00000000 [ 319.993142] TSC Offset = 0xffffff52d81f4112 [ 319.997566] EPT pointer = 0x000000008d5ee01e 05:19:04 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:04 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0x4004ae8b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000180)=0x6e, 0x80800) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x0) 05:19:04 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3b00000000000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x48000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) [ 320.135151] overlayfs: filesystem on './file0' not supported as upperdir 05:19:05 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x418000, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x1}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={r1, 0x7fc00000000000}, 0x8) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x200000, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000100)={@loopback, 0xc, r3}) 05:19:05 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay0', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:05 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0x4090ae82, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7400, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) sysfs$1(0x1, &(0x7f0000000080)='.%\x00') 05:19:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:05 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video0\x00', 0x2, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x4, 0x323801) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f00000000c0)=[0x10000]) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) 05:19:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4c, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:05 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\f', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:05 executing program 2: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x200, 0x70bd29, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) 05:19:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3ff7f8, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:05 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x2) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8000) getpeername(r0, &(0x7f0000000180)=@un=@abs, &(0x7f0000000080)=0x80) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) 05:19:05 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0x8138ae83, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3b000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x18, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:05 executing program 2: lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000000c0)={0x0, 0xfb, 0xa0, 0x6, 0x300000000000, "9e4ad0b7e5e06fdcdbfb9c9be34de7c7", "e6758e69108b5e63cd347fbb56fa901923fc0ce4177b2fd9cec495362772c1c09d061bed897944082a86acf480f8e4b82845975699943fb9576179fd58bb860476945b5da78ee4e028e3b1370c464ba30f1ad5ac917a05f9ac988df04274e342c7104d751cf5211da14026c200486ff3af705becc0c19922dec59c15ac3f595f12d6f0f0388af7a52b94aa"}, 0xa0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x2) r0 = openat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x40, 0x4) lsetxattr$trusted_overlay_opaque(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x1, 0x0) rmdir(&(0x7f0000000340)='./file0\x00') dup3(r0, r1, 0x80000) 05:19:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x2, 0x3, 0x400, 0x3, 0x81}}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) rmdir(&(0x7f0000000180)='./file0\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000001c0)={0x0, 0x8a3, 0x0, 0x0, 0x5, 0x100000001, 0x11fc, 0x10001, 0x0}, &(0x7f0000000200)=0x20) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000240)={r1, @in6={{0xa, 0x4e24, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}}, 0x1, 0x35fd, 0xff, 0x6, 0xa7}, &(0x7f0000000300)=0x98) 05:19:05 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\xf0', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x80000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:05 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xc018ae85, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:05 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f00000000c0)) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r1, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) open$dir(&(0x7f0000000040)='./file0\x00', 0x101000, 0xc2) mknod(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffc, 0x10000) 05:19:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x800000000000) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 05:19:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:05 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='personality\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000280)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'yam0\x00\x00\x06\x00\x01\x00', r1}) r3 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0xfff, 0x10001) bind$xdp(r0, &(0x7f00000001c0)={0x2c, 0x1, r2, 0x36, r3}, 0x10) 05:19:06 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0x5450, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4c00, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:06 executing program 2: mknod(&(0x7f0000000040)='./file0\x00', 0x8000, 0x0) 05:19:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x100, 0x0) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f00000000c0)={0x9, 0x1, 0xd07, 0x70, &(0x7f0000000180)=""/112, 0x8f, &(0x7f0000000200)=""/143, 0x42, &(0x7f00000002c0)=""/66}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) [ 321.360013] overlayfs: filesystem on './file0' not supported as upperdir 05:19:06 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x12, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:06 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x2) 05:19:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0xfd43, 0x2000) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000180)={0x6, 0x5}) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f0000000240)={0x47, "32787261a5f585d4b9d3a9fdce9b438d38f442af34746e12a40923c12c37c684", 0x2, 0x8f, 0x2, 0x3280e0, 0xe}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) mkdir(&(0x7f0000000080)='./file0\x00', 0x20) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000200)={{&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x1}) 05:19:06 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:06 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)) r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000100)='personality\x00') ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000040)) write$capi20(r1, &(0x7f0000000080)={0xfffffffffffffd30, 0x5, 0xc7, 0x0, 0x28a, 0x8}, 0xf) 05:19:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:06 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)) [ 321.731841] overlayfs: filesystem on './file0' not supported as upperdir 05:19:06 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0x8090ae81, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffff97, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:06 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:06 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000080)=""/188) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 05:19:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x60000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:06 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001940)='/dev/vga_arbiter\x00', 0x20801, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000001d40)={0x6, 0x9, 0x4, 'queue0\x00', 0xbdc5}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001d00)='/proc/capi/capi20ncci\x00', 0x101000, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001980)={'team0\x00', 0x0}) bind$packet(r1, &(0x7f00000019c0)={0x11, 0x6, r2, 0x1, 0x4, 0x6, @broadcast}, 0x14) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ubi_ctrl\x00', 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000016c0)=[{&(0x7f00000002c0)=""/59, 0x3b}, {&(0x7f0000000300)}, {&(0x7f0000000340)=""/46, 0x2e}, {&(0x7f0000000380)=""/203, 0xcb}, {&(0x7f0000000480)=""/68, 0x44}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/205, 0xcd}, {&(0x7f0000001600)=""/180, 0xb4}], 0x8}, 0x10000) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) seccomp(0x1, 0x1, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ptrace$getregset(0x4204, r0, 0x7, &(0x7f0000000240)={&(0x7f0000000180)=""/84, 0x54}) msgget(0x0, 0x200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001a40)='TIPCv2\x00') ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000001cc0)={'ipddp0\x00', @broadcast}) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000001c80)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001c40)={&(0x7f0000001a80)={0x190, r4, 0x716, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x3c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @rand_addr=0x9}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0xffffffffffff8000, @local, 0x83cd2a7}}}}]}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9c0000000000000}]}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x100}]}, @TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200000000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xf7dc}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x66}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x800}]}, @TIPC_NLA_LINK={0x48, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x100000001}]}]}, 0x190}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) recvmsg$kcm(r3, &(0x7f0000001900)={&(0x7f0000001780)=@rc, 0x80, &(0x7f0000001800)=[{&(0x7f0000000300)=""/26, 0x1a}], 0x1, &(0x7f0000001840)=""/129, 0x81}, 0x2121) mkdir(&(0x7f0000001a00)='./file0\x00', 0x1) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) 05:19:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x48, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:06 executing program 2: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$SIOCAX25NOUID(r0, 0x89e3, &(0x7f00000002c0)=0x1) lsetxattr$security_smack_transmute(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000280)='TRUE', 0x4, 0x3) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={0xffffffffffffff9c}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x3, 0x0, 0x3, 0x200, 0x0}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000140)=""/124, &(0x7f00000001c0)=0x7c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000100)={r2, 0x100000000, 0x7}, 0x8) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x1) 05:19:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2d, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) [ 322.081650] overlayfs: filesystem on './file0' not supported as upperdir 05:19:07 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0x81a0ae8c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x9, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:07 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) 05:19:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:07 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:07 executing program 2: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 05:19:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3ff800, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) [ 322.460015] overlayfs: filesystem on './file0' not supported as upperdir 05:19:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x3f, 0x2, 0x1, "e261599616a5b5f60a63d11e69ffdc97", "0bdbc3bda93abae904ec54c84a9701a1eb13487bd4a9dc73ca1818798b753d32f3df0bd5d0f1fdb9ed56"}, 0x3f, 0x1) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)) 05:19:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:07 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0x4048ae9b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:07 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\xfe', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:07 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) listen(r0, 0x15) r1 = socket$rxrpc(0x21, 0x2, 0x2) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000040)='irlan0\x00'}) 05:19:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) 05:19:07 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x101100, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000080)={0x101, 0x80, 0x1, {0x0, 0x1c9c380}, 0x2, 0x1a80}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000100)={0x10001, 0x400, 0x4, 'queue0\x00', 0x100}) mknod(&(0x7f0000000000)='./file0\x00', 0x40000000000000, 0x1) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x20800) 05:19:07 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0x8004ae98, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x12000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:07 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x2) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x4200, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={&(0x7f0000000200)=@in={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000240)="409db373afc60dae11561486655b82f78f93659a9d52d45ab94f9854f6d853c757df9df1e9aadd8ae1003e6bd05dbf31da1dbc452b80e2a033cc2dcbf226c8f3bf81298d0cacc47df56bae8fca631857f9a3b5b10f6122f3f4026d", 0x5b}, {&(0x7f00000002c0)="a7cc3d63ca44fb40eb83952552d8c66bc81abf625d13ce0361ed8e4b3e9cc084a1e878fff745614b8df6ca7982f4d6c6ec1e6e351344366261733beba0d91e0212d144bae93026fe8bb4df94253f208e5a5f58e34b9fd6b7d1fdfa27c6339e21593dbb0890aae8a00c768be1638da4f3d6da98bc7a04fe37dcfd0c1dd6d26696784fcf61a74412a3a28ce0de939c52b783258b910f018b3f9f70f14c3c4ddccd9a6e0a6d3aff33bd64b1d101c9ae1446c5624d05631f38e854a4ab45cac335f21d67b693e622938e8082f973e186f24792d38bbf556551ac589f45349c48e3bfbe1c7e4373042d30073cd936900c0e5beab0000f993d1a", 0xf7}, {&(0x7f00000003c0)="3a56a6775ad7b8bf0385bdd2a21eeb9a8c11fa66bc4b4bc3bbd4281e327f15f30f74a379ba27c45e306518531e31d47f", 0x30}, {&(0x7f0000000400)="d539eb907cac35a931004a50794b93c31af578b1ff67ea09bd20a92d7a8cb476161751f5f1dd1a", 0x27}, {&(0x7f0000000440)="e0ece2d933a9ef8880a78bf40264dd7f15b54d5c254a0034e15f57e483ee5020f0633e1eb9eedce96ba166d7c2", 0x2d}], 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="20000000000000008400000008000000fe800000000000001f000000000000bb"], 0x20}, 0x8000) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) modify_ldt$write(0x1, &(0x7f00000000c0)={0x10000, 0x0, 0xffffffffffffffff, 0x2, 0x9, 0x5, 0xa915, 0x3, 0x3, 0xfff}, 0x10) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1, 0x9}, 0x1c) 05:19:07 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 05:19:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) [ 323.081048] overlayfs: filesystem on './file0' not supported as upperdir 05:19:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0x1, 0x2) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000400)=ANY=[@ANYBLOB="090000000000000008000000000000000500000000000000", @ANYRES32=r2, @ANYBLOB="00000000000000004844ba9300000000000000000ecfaaa31c9c191e429d227cf9f0000dbe1d3254a85e861b196481082b0c000800000000000032e0e10244999ac10a85d6c9d83cd551ea3246b1c3b8a1adc5a2d58a109bea06827ced112e4ec52149b544a8fd7aa139b92f4472f13820d35f56eed70ba60c4ccfcd519763c6de", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r2, @ANYBLOB="00000000018000000000000000000000000000000000000000000000", @ANYRES32=r2, @ANYRESDEC=r1, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\t\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x400, 0x0) renameat2(r3, &(0x7f0000000200)='./file0/file0\x00', r2, &(0x7f0000000540)='./file0\x00', 0x4) socket$rds(0x15, 0x5, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f00000007c0)={0x0, 0x39, "b10dff790e96bec668c9cbe498d4c5eaf7b7de8a2e758c9780fd9d307730516bad7a64681d243dcaade6c7388e4a1b64b9e147318b9333ffe6"}, &(0x7f0000000840)=0x41) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000880)={r4, 0x8001}, 0x8) syz_mount_image$iso9660(&(0x7f00000003c0)='iso9660\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x2, &(0x7f0000000680)=[{&(0x7f00000005c0)="64b46159d2c070fbf51652750d000dc99aec2832c17bbba33d54d5f2faa4a7262ca9679ee3c5dc399aab358517057c67991b274b", 0x34, 0x8}, {&(0x7f0000000600)="cb0e0ae9cce4829ff38810dfe3176fdaafcae36338b63196dc2d130e18eec5482777777f0927617f537981ec010d4dd276fab6d5016be168774779f23e2291fe41bcb7e2460e5732cfe7e38f37e9f02b9e04be4c047a88ae5091f0c731081d572a7cbbe714ec56913033d64fac811fb241887665ada3bd0092", 0x79, 0xfffffffffffff001}], 0x8, &(0x7f00000006c0)={[{@gid={'gid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0x3}}, {@sbsector={'sbsector', 0x3d, 0x8000}}, {@map_off='map=off'}], [{@fowner_lt={'fowner<', r0}}, {@audit='audit'}, {@appraise='appraise'}, {@appraise='appraise'}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/vbi#\x00'}}, {@seclabel='seclabel'}]}) r5 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x394b800, 0x40000) r6 = syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x115100) accept$ax25(r6, &(0x7f0000000340)={{0x3, @rose}, [@netrom, @rose, @null, @bcast, @null, @remote, @bcast, @default]}, &(0x7f0000000280)=0x48) openat(r2, &(0x7f0000000780)='./file0/file0\x00', 0x220000, 0x8) fsetxattr$security_smack_transmute(r5, &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x2) syz_open_dev$vbi(&(0x7f0000000300)='/dev/vbi#\x00', 0x3, 0x2) 05:19:07 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0x5451, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:07 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x404000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000180)={{{@in=@local, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000280)=0xe8) fstat(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x2201020, &(0x7f00000003c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}], [{@euid_eq={'euid', 0x3d, r4}}, {@seclabel='seclabel'}, {@smackfstransmute={'smackfstransmute'}}, {@fsname={'fsname', 0x3d, '{-eth0cpusetuseruser'}}, {@obj_user={'obj_user', 0x3d, 'memory.events\x00'}}, {@appraise_type='appraise_type=imasig'}, {@fsuuid={'fsuuid', 0x3d, {[0x3f, 0x0, 0x35, 0x77, 0x76, 0x0, 0x0, 0x37], 0x2d, [0x7f, 0x0, 0x67], 0x2d, [0x7f, 0x33, 0x39, 0x31], 0x2d, [0x7f, 0x77, 0x65, 0x66], 0x2d, [0x0, 0x62, 0x39, 0x77, 0x0, 0x67, 0x66, 0x77]}}}]}}) fanotify_mark(r0, 0x80, 0x40000010, r1, &(0x7f00000000c0)='./file0\x00') 05:19:08 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2d000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:08 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) 05:19:08 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0x5421, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:08 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x40) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)) mkdir(&(0x7f0000000040)='./file0\x00', 0x1) [ 323.360632] overlayfs: filesystem on './file0' not supported as upperdir 05:19:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:08 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4800, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:08 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x1, 0x0) mknodat(r0, &(0x7f0000000080)='./file0\x00', 0xc000, 0x5) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000000c0)="842ad40526829798f27cfd39d43c74efcfb23468dd43a37e5bd569e7430738f2ad1c2b46fd8b381646fee8a3e0aa13b5c9a4f3b89543579133c6b0c09c8fba579abe22a472dea2604e99b76db0d19b2450b8768c476de43bfd8120401a465836685703a31d235fd62b4d6a0d9f85207d7c3e42204604eec560c21a8b981a7c7d58997c4cc2f772832070625576b58a30664404c28a62825a38e0fe75a1a733cb477b4b17618fe6695e4d7c8e5d15d87d04d994f23de831aa080ec8fc40e8c17441db9ec739861e7505ab751c2efac7e0aa8c81a8733e9da0b1b01c1c311220bb1435afdb702af95bfe7f3a820bcffaab43ba9fec4a6b984b14") 05:19:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x2, 0x0) ioctl$sock_bt_hci(r0, 0x400448e6, &(0x7f00000000c0)="713bbd291dd19f33cbbd6e2bbe964516a56bb61e088e7a8b56ea994817736128") openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x8000, 0x0) write$tun(r0, &(0x7f00000001c0)={@val, @void, @ipv6={0x0, 0x6, "f0e54c", 0x4f2, 0x2f, 0x100000001, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast1, {[@dstopts={0xf7, 0x39, [], [@generic={0x8, 0xfd, "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"}, @generic={0x47, 0xb6, "4733e3bea5ef9f1b7e96108ca7800c4198c3993e723f9cc1b39786a8a4f18e326bfb9738d84989fda6ba3d90d73bbc1cc6d46a44e6e05da225e885eb311e1dfd06d5733023043e7a6746800cef7143704759dfcc1c2b0569d8dd2b1a06be9da028d4122532aa0fe2d1ec018251fa70288d25f2331257c6ef9437163bd8ab419204c043c8db854092c9f30bfba5477f859e34fa4ad07cddce3dfcbf186de87d2fd48df8943a0041c18ffb000a73a770952367e511a6b5"}, @hao={0xc9, 0x10, @remote}]}], @gre={{0x0, 0x0, 0x1, 0x5, 0x0, 0x2, 0x0, 0x1, 0x880b, 0xef, 0x3, [], "aea4f0e96d873702cf4cc7bec812f5f2e7c6d5f501cd5855fdd7272eb08f6857e75a2b3f1b91084a0e966805ec9f9b61031dd640244e08b6bb5daba964b047dae284b61acd1ad3ca185e5e49f8e1813cc93dcb499f3c89630ae0719db6b299e439f90645218b054da9109fe9a4a8f47b9304b83545895b24bef59aa647ffd230fe6e96ecb89c6846e3af043318773d3c5152e2709f69c86b2244ac110d5fdf70f5a778527abc20bd9d8277da7ea52a8e809190946a27d3376d3f69acf889f206024aa8cc0ccc83d7498d4656c84c6d19b15a7dba127b739947c50cdf2f62d805e08596df01d64c463e3b00acf0f864"}, {0x81, 0x0, 0xd, 0xffffffffffffff53, 0x0, 0x0, 0x800, [0x6, 0x7, 0x1], "5f11f253c58c52346002d14b82e48508c35e8eaab13598b89a4baea2010135455f41b88e61e8fac8b4c0c3add2eb2e5d1397eb2f8eca616aae0b57a8fe2dd241e3873c43eb2bdf810041a01ab75627a083816f84239a2dbf7b22d5467854dd690d5f7845dd1f105fc362f66e934ae9cfd585bded65aa35a023a7e24f10738595c56c4d34eb8026ebd24f1fb2ae88c9e3d15f2308620207dd61e16ec5a5e58714e635abbe755458"}, {0x52, 0x0, 0x20, 0x10000, 0x0, 0x0, 0x86dd, [0xffffffff], "a5d3e140b3fb4dcbc1bd0fcc7a08229eed016b5a3fb673cb76b80d8ef20c9e233708d6e87278e84ae27eddf9e7b72db43678a015d0ab4b6df94b0009073ff6dd72258bd3789e8a2bc59c6359a754eedf979088bfd622b13ed10f4742fcf2f0408d6337a9cad3b9dc"}, {0x8, 0x88be, 0x4, {{0x80000000, 0x1, 0xf94a, 0x6, 0xd9, 0x2, 0x3, 0x2}, 0x1, 0x5}}, {0x8, 0x22eb, 0x0, {{0x8, 0x2, 0x0, 0x5, 0xdb9, 0x4, 0x8, 0x20d1efc3}, 0x2, 0x6, 0x4, 0x1, 0x80000001, 0x100, 0x2, 0x6, 0x7, 0x1}}, {0x8, 0x6558, 0x2, "b01e74b476c01df19337b663500db8f4e40ba5110c4bce0c20423c272463ff81e438fa4b1eccea933d56cad77c846285d9d5987d839a84f19df4289386f4f0c2c988a96b797948c21e5d4cd7821015f865823d070b52e7c3ea3fa8621c05e5e0f4120a7c0a01d2a8f2120322079b2f916d33e74d228289d04164b07ee806d366cd04a304364fb7d84af9798f3b9fab34449106421c30d975c2236f54e84446c59397aa9a953b882420bb50cd225b2e190a8c9795b2004c0322337374323250954cd566e4159b7a4ddbdcf249efe2678b"}}}}}, 0x51e) 05:19:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3b00, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:08 executing program 2: removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 05:19:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffd) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) 05:19:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x74, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) [ 323.689429] overlayfs: filesystem on './file0' not supported as upperdir 05:19:08 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xc0189436, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:08 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:08 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x4, 0x280) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x10000001d) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 05:19:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x2, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000015c0)={0x0, 0x0}, &(0x7f0000003b00)=0x15) getgroups(0x6, &(0x7f0000001640)=[0xee01, 0xee01, 0x0, 0xffffffffffffffff, 0xee01, 0xee00]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001680)={0x0}, &(0x7f00000016c0)=0xc) stat(&(0x7f0000001700)='./file0\x00', &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000017c0)={0x0, 0x0, 0x0}, &(0x7f0000001800)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001840)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000001980)=0xe8) getgroups(0x8, &(0x7f00000019c0)=[0x0, 0xee01, 0xee00, 0xee01, 0xee01, 0xee00, 0xee00, 0xee01]) r12 = openat$uhid(0xffffffffffffff9c, &(0x7f0000001d40)='/dev/uhid\x00', 0x802, 0x0) r13 = accept$packet(0xffffffffffffffff, &(0x7f0000001d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001dc0)=0x14) r14 = accept$ax25(0xffffffffffffff9c, &(0x7f0000001e00)={{0x3, @null}, [@netrom, @null, @netrom, @default, @netrom, @null, @default, @default]}, &(0x7f0000001e80)=0x48) r15 = socket$bt_rfcomm(0x1f, 0x1, 0x3) r16 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001ec0)='syz1\x00', 0x200002, 0x0) r17 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001f00)='net/raw\x00') r18 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001f40)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r19 = eventfd2(0x7f, 0x1) r20 = socket$xdp(0x2c, 0x3, 0x0) r21 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001f80)='/dev/ubi_ctrl\x00', 0x10000, 0x0) r22 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000001fc0)='cgroup.subtree_control\x00', 0x2, 0x0) r23 = socket$netlink(0x10, 0x3, 0xc) r24 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002000)={0x0}, &(0x7f0000002040)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002080)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x5, &(0x7f0000002100)=[0x0, 0xee01, 0xee01, 0xee01, 0x0]) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000002140)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002180)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@remote}}, &(0x7f0000002280)=0xe8) getgroups(0xa, &(0x7f00000022c0)=[0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0]) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000003800)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003840)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000003940)=0xe8) getgroups(0x1, &(0x7f0000003980)=[0x0]) r34 = socket$isdn_base(0x22, 0x3, 0x0) sendmmsg$unix(r0, &(0x7f0000003a00)=[{&(0x7f0000000180)=@abs={0x1, 0x0, 0x8000}, 0x6e, &(0x7f00000013c0)=[{&(0x7f00000000c0)="c1cb2b3e43685e834b45dbdef9e1ec0374b59b44f57f2aa6d2b81c410bc26213f7b31e", 0x23}, {&(0x7f0000000200)="c42fef2b0e9c9f59d1b4de65d04a7eba20926ad030b0134881296c006643026b64d034c7f61d5def65f5d0ad20ca46911a3f2bba8d96cc7f5c5d69d1a79d03df84842d9fbfaa5e6d43d87a67a5497ac2da5ac1a6c1d8174c22f7d151b5e4aafe8bbb6403ed50ea0f493a860da47f459a0d81130d4b9a4ef6e8f373700c62f6f051ef831a20b5a97a26efd399002852ce9488a340d9675add3e47ec0e5cd3ebd8738d026b5029d223ebea6d5d05c551f21431a7593251d61c2f6a7838e9a361f89b", 0xc1}, {&(0x7f0000000300)="874c9e148e137e", 0x7}, {&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000001340)="1050eb6131dce4d4b4362b9761e1d7d88ed08fd07de3f2447da607f22da724524a95ede60ad1482937a5fbab1c2b036e7105cd03f6f6896bfdb3053b219209b8d7369501fddb3828378d4320f006e65504e9ac0417ebaf23d3b9497d201c94c068bfd8a8babe07893f29dba61028d460db41553c8c36a53d989e7529a98972", 0x7f}], 0x5, 0x0, 0x0, 0x4}, {&(0x7f0000001440)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001540)=[{&(0x7f00000014c0)="e3473a13d80699d9809bbfd7348ee0cd2a59fa58b09de1d53cf0066a85031e642131362e07855757c614600b5e8b2ff6474793fa6fab5b4a89f9666b3da3089f6ffb6d23f1a953944760b230", 0x4c}], 0x1, &(0x7f0000001a00)=[@rights={0x18, 0x1, 0x1, [r1, r2]}, @cred={0x20, 0x1, 0x2, r3, r4, r5}, @cred={0x20, 0x1, 0x2, r6, r7, r8}, @cred={0x20, 0x1, 0x2, r9, r10, r11}], 0x78, 0x8000}, {&(0x7f0000001a80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001d00)=[{&(0x7f0000001b00)="1a5646e23c3b61b52cafe3cf559fac542082129f6b9aa23943100ee1e9", 0x1d}, {&(0x7f0000001b40)="ac54cdf310927ea348e9c535f13859b647a81d0efd379098c1ead9de539453db580660152319564b72c4a1e4ec747c28efbf03fb446977ae9c5218d0205a05aab1b10b6cb4f48de970d2b762267a39b4f9f451a55f08dcda03b30b552d3f1a37d585011dddcfb8047a093521d82792fc73086250cd625ae11e661f4b889ebd4d5113ac0dd51ef6d241a2440f8c654a5534d2f2258f7de3eb16269477370c7a480ba5918d3d29a545838460f9643ac794c39aa2350642b56f9e50089c03", 0xbd}, {&(0x7f0000001c00)="8006acef52d006f8509224c22b4fa56e1c3c37ec274a32bbb53531d2c0d8a0", 0x1f}, {&(0x7f0000001c40)="4d9c9c25440dc1b7d67094a4c0b568af432dec0e838bedd2aa8eec81a21ac6264f159661240d37f71549037b315495e2e9cef1ebcaa6dbd52ce625f71fafbb30542226e8e6b36b7b3357fe6f28144418df08d0e120e08a9ba048f41449dd04311440877b0eb4463bc84179aacc8874db1d87ae2d17cb24cfd83acddf744f12050192f1425017eddbbaa42faedad90f0913e1ea0728b35c2ba616f714179867f80c80b5ee94900f26ec77a34eb3", 0xad}], 0x4, &(0x7f0000002300)=[@rights={0x18, 0x1, 0x1, [r12, r13]}, @rights={0x28, 0x1, 0x1, [r14, r15, r16, r17, r18]}, @rights={0x20, 0x1, 0x1, [r19, r20, r21]}, @rights={0x20, 0x1, 0x1, [r22, r23, r24]}, @cred={0x20, 0x1, 0x2, r25, r26, r27}, @cred={0x20, 0x1, 0x2, r28, r29, r30}], 0xc0, 0x4000000}, {&(0x7f00000023c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000003780)=[{&(0x7f0000002440)="33e0701f36fb41539a78fe10928b743d07586af350e92c9d31e328f60dd1a9f965cf631b53d09206d65d8513741a93ca59a51217d503a1d87c041a5dfd2726b741b17a0afaa1263787702289f63f36ad87628d79fe1ea18180bf32e8b78b9f227d871db73726a68aab58e17c9c7a2ef7d8d66d98f34ba09b5b9944b3a7d0091ca9dc72094469af0453", 0x89}, {&(0x7f0000002500)="e96bf203bff3d23bc09a2eaaa9a3ea84bc6591c9ea66fb414c34fb10caf86e9ee7c14361a45ad60c00a25094a200dfe7f4fc4f8b4da9ba24ecbdb8fdeeaf595977d4b317f6f3aeb8e62bc6bd83203afd57788abc2e90af2c66e1ff38eb49da9e202d9b6afd5bc611c11ae4d3ab35e2cf2ac193d651eb4c523ae6b135468c351eb87d6297ce4cc078ef171c22", 0x8c}, {&(0x7f00000025c0)="4605a6d55241386cab7bcbf8e1e36cab6a70b79e326e41edeac980e85d2ba535bfe1548ee3dc5ea7a5091853b8c658bfbf8dab0200c64bc55bf501cad994b31739810b56cf147f6e0d2fedb23291a6aca98b053ebd7a2c26fabb548c30585ca681d6b2dadfb84b4d685cf2c4f1ab63692cbf263d359497f84577777617f2bb8d1b309a7f4b2de8248e8360fb87bc45d2d6669191053a93c903f1049eb1ad37098381886548dc17bfa5c9b0e6c343de70a275c89a866dcab0fa2fab8da3a181358a84e5d00d47fcac063121361a9f6cd9296b00e2eb0b818a14217e5b6682c7054b3d13b5b9091e341e2f9907ae80c069057e169d8f43d83be3c62912a9b82f6f65121a0ba5015946ddbc21ae6ab24ca10f2ea60f3fb25808ec86a6804aa538895dd4861f170fb1101c04f651471315aaff3309ea49da0c72a56f8bf265ba8d12cdf80f3536e0366afc573754655292c3a9c5f6485e277f73bff75b8ae316b99cb97a35fea48ddd4779ca4d5b628ddd701b9b697c3385ca62236cfdcb41f5c5c16753e6dd7ee70ea2f3e79eaffe881545845a674806aeba6223ac24e17b47ee2d896205b30e8c584a0029978f4a0a8eb3a5feaf7f3e1f49afb2f0694b415d889217727ee44462e0d3f463deb0e111a50d1ff576e98f011a386da060cbdfbe8af0958ffcc9cd5206c3d6491d8e265ef165ec0c81755a14e02b34c17f2eaaaf5fa85e02cda2eb38fefd27a07e2701591188e63ac5320298b0122d0883df328aec49f887b9623ecf62856fcd85de6c9480d6a98b6ff01d72d6c2d236e8c9fc7df5e4d4c1c6e03b35275ead8b20c038f1efaccb4b5aa60382a1af5914735a329b6ad9c9509a488a96942aef8bf03c6d4fc2240c7118686de57ac811fab2ab8608c39c526f294c58912c706b3bbfb5919ab4844e1356e6a4caac6a98f4b17843b29f4ec78fb1365c861dc891105e577222f398b98ea0c32d3ab3520655b5c7e7a6b10f8958d88e37896cb20ca5b55bf7a5c7b4523eafb479dc5b254b6cdaf6a29d9ec03eb974c2167726a8bbcd9ce8882590615727200204611b09b4dae8cf3b5e6775e77572c95171d385f4e4a84372881f021e279d5310b5e8f82cd32e21c8828e9b0dcc0ad37afe45b6444e3e9d7e9f6416b4f96aa46dbf5976a6ee29ec613499cc14bc4129fa3ba6f4f26c3e974abde6fb63eb5f552314700a24d79eca78676155bee656ffa85dc87e6b7bc2dd0c7e3c79076f60d9fae29f80b0950c3ae2a6d820f893912f771ef696cc084bfabe9bb2c2d05b5973276504d1dff62d25701fad827d5e498cc6db34a8c1d04916cad5764914bdd80f5edcfadcc0ed9a426d2cbead12ef8d44500b822d1d54b01755c417ccabf3d40c1302ec8f1e0971f750bc662e08381c2e9b887e4e0ce91bd97eb7e2231ba5017b70d1da4955e0ae1830775319c35cda2f8f5dac1c324b6932d9ca110d7396f5b1e89b2186765e30eaa0fa1b37759c0be1b6f089dd5c0b830f336d8fad9184b59ad49437b256a41a1e5b098ffaa6b1c237f674822fbfc47c4f4a529986d995329b3ddb66dbb6719ae847aa6545fd318d4a8e221197aba3fe9f2389f0488f84185898586ff586ef5af568f9c73501c0d19ea95d680e4e367478cf637d81ab6884afa24de0c8cdb4d24878b4808784963b95a84ec3b25d00b766175fcb78cdd8054d0e688a8ebc352a7cb134ae3f99ae0563a6f206ea68b02908913050cb1f2b57fa2acbd39427d000371f1861693cd4402d9e407258cadebf02910541b5425e1ec0f848f31743bd615e8b1d06aab3cddc5e028e996b59b438213a240f0da86420086942b0b271e81351d98bd99b654c252d3b544d2d2b2cb9278f67af6d76255185bd1115d449370126add22ece670646cc12fa3df27ff38da344ec6ae721c6b3c698127d370aa893b8adb2c880fc4c5e840c10615bbf5eb40c7066ad846c9a849e00771a3e6bdac5c721b125fe149a579257de0eb344c58cd994cc107c2e6b643f5e03d30efc7722d6ad692f913eed917eea4942d3340b4c1d055eafe472e3eb5fa91859e789fbca2fce78b4895f24d8adaad7e6f6097f1337faeeaeb6aef98800464572b78074eb0cae6a50495fb15bce192061a09c72cbbfd2d2db31c495486892a211524ff8032f213f88be138beae59b2df1b4e78dd42b3401661a678cdd3a3afc6b5958f4f6a54df9d222fc36a97013ec6fcd0721ff6915f058848f3a59392f27e46c369c230ae4f696b7a59254ed0d3c5f22bd64107fde8ff54a736981b79dec4392d32e0bbd1a97062e43fbf54324442eb08373da6d82bfc03c17f1fd461f2e96d8b9f04855078c9e2220787c3b8e89547749efe9f834b15eb782ca342b278e9065585fe3e8e324c7b62ef1a25bb3e13293d379c66d2947ef08267188ce5a5124f844cef393c76ba4ad15002e7a81bbb0058b889bedb9bfc0440d787c700619cd6de564757b30c224b0768098325dae53c0eef5ecba6f2becfcb1e360fe1cfae82f556eba437353595fc8ff2bf0b656556e53065f1a8fedb8559718d8f94d26bbaeea12098560e34000c96cef832c41e7d30a82fd88d59ec4f14e5431d33be781979e08581f8277599459d068f779a280af4af69fb51025abd816c3534d350054a3df1ec39b9de439a8174fc7834636579d460b4f46e12aa5af9263045f85d4f79f9897c4b3f85b5b26883c1e399b6d5bc2047317d7bcb6f9144872fd3a4ca45e9dae4a1596ca637fc5bdc996462664811058e50228d54d0be87ce2b73a6d31183c3b67317420f1c8ec5584f595debbace356f9db64fa75ef11489a9e2ef19cf91bdf504fbd9fdfbdd5de650bd44e15cc1132723e0948413f521bdbbff73531bd503711cb99239fbc2ae942624a475ecd1d3aa18bc0a22337cb42b35ed509103dde6a1d352d92447617796fc683d0341cc42dfd4a04740f9aeffa526d35c89ef96747f58facf226e723a2aa224af39d881d096ac72bf25da81d2aa138fb9a8af5cfa74e26c1f498e4bf6400a9ee7a27b53c30b34af89d04ffa135f5890280b190b0923db19c3fb34ca1e63bd4184cf5a2fec09800daa351e0eb61e2754e607fd9925f287dfbce526e9fa69c5f0b77acc61b02bfcaf426c0adf32f3f81333269f6543e64a31dbfdb7b4fe47225db7f9ce19bb016d4b334e12ddfdd52cb14c3759365d49f4ee2f098981089c4d52cb84513430bc848846ffe96409f12903262df7a2571165a212e0ff76d44be3773d867c490cafe7ff4e013a8e39b7111bc9b6b5611ec2e35532c47d04ccb712ee091b915c867060beeed5388848ff6dfcd9c9da10129a3787bc698bf116f9384cbe31c5fe75c34b0fed8de22990702a83e44dcccdd8cc4ad3b7f4bbd701d5592ee51eff949d50768b5aeacee7bd73df9f61436d59f4e3939aadcdd04c90e2478b64467849b328fc5873a04a59bf5170e0fffcd8c400619b88251fde63abbcad9eef1e02f2388fede8e21792b8463f9ea950ccb4fa63ac65a68d86069c542f6c3c76a8a073d5f8dab8547648b0eb2e8d2abb0763b7a3375c9cd0f9008b61bfc8b66811e3798d9eb770a99eaace08287fe21d116e3c28d205f12e7efc4530a3559b796e3efd30a733e306f3af7734ffbf9a5a4f1a400f7fc73a0e5a8fffd679007f077474fad0bc8922fc81c5818e76a9f1f7c8ad5f418b6c3abcdab2867e99aca2ee269afd47367adc1bc06ebdbec2f8ab9fca06d97f827ced39e95090bdc694df09c11fa067f18854f5eb71700247c2b9bfe8fce64660b35fbf925c468ea9ec0ca2a31fa039c983daeba76cdff1b7b5940543dcfcc90c13bb7ad22274745186202ad87eb96aace45aadffa1a10dcf3c57379e7b0d671aec0d327053890850ce865bcc1077f5984bef76cd8019ebaccf94378fb3a997a112aea399406714987001ea15274fc1233506d1ef07b6998914aece65ab096c056e7455d0789537de29276cd9731e581581586d395e2f3928b688b208d382e38ae91fe0ceb89dbe675d77841868d5516ccafa8811388dd5032a5cb650bad234d59aa83c8612de2ddbc97576490cee0bd613b33a964ebc7797acc2d0d5d8e20eace88dbd1b3732f9a24a36221c1313796781cafe74778a47ded25e85cf323e635b46cb1962f03e371525cbc551458356a72fa224f82aa535eca6c5c67cc3224a61513044679873d929f473d5db4242b0040c01396cfbb2f4aee56a6df7965785b580ac4f69d6b38666fe21763733086deda646e80158110cd7f03fd9b926156b9932f9ad571a110c232823dabfd966d28409865efde30fc88579700eb2d927b16cbb5a26a042a3633717f3ccd157e39959fe508bf898bec4d68779e411d3d6cabdcc0ede73c5b25e95552d31528cb98bce433d86397f93cc4b82088ee7d00c0cbdf99bf3889c9a4d9dc9927ea9da3860fc464436d7541b069dbde686e47535c011c7423226db7f5fcd2316311fd31999429fef815c827c32b93ca4753c6c129330a180258e644df3584dd9d30aba12eafc8e435ceef47eb4d1071d8472a0871ec2e1dc7cd77e994ee29f84fc616a0a58b53d7d00b3155746d1c5943deca4c1d53ce145fa89fdb979897dff3b8d980e490e0a8687b0d9d8fb4910ae1a632d8979113d65d94447d6caf8d492d2e9695feeff741e911a370bd8b1c73d77a7ac9272f64f8458816267614eb5a4488d6c43d4a5b75959c8515072af9e5f9237decf0e855720c0ef81910f836cd3360499c97f069d42dc6e9da15f1e399cbce50c146a9e6ce6c6d6a0842c3c4d6c1da637913f31b4db8afb4f3623524c87f829b3464ddf60ac24bf7c8bf92fc52abffa02dd4b416a347b805604a80655e52f1492b6a4725280ae39ea40d39030b0bcee01bd7f5e3b29915e0c49412db5043a9decfee88594bac96fbd124a7e568d669150bc5d22761c62cb93f620fbb5606ad55368b74142fa8837e61ef98107f7a041002e2966f7dfca620445885be803be7dcc0b598fd923f977ff10ee2104d5ff5ff6743098b3525e03e98dc361beab0fa60ba3c1403fc886398e0025cd259d18b9fa6c968f0788e15434671646b9239beed4e1f9554206b3207bd7c760c10496d5304cacb4cc4f3228f08e78ffb3368c6c29f552a2004aa9e68f99c48732045c965beea87414cbd4b9d66919a5ac4c2ef6ddf8fdea9bdb7bddaeb27d4b560969500d4ca03c3ffc94cd6e31627099b93c93d0cd8b175048a83132a4aa0d339747bbde1e84e7afd8ca1dcda68c65a8bfa89cea1e7b78fa2eb23df849d70ac023ae14d65deb2ed9db921d8ac3b00854dd61ebc710de2464b8434e3ae3b35401f6704deeecab5730c4471aa428c836258d240c63936ecae72d6e3ea007add635cb1e7890b6f7e7c32602edf6a3f1f54e9948afd7054712753039cc9d387052f6bb1c69b064590ebd307bab90c4d1fb516389bd7bcfa987c4f202ef0dbde09445f4a123ed2dfff3dbd9c79cf97710d81edb67b45eb95dda1aa5837a0fbb875d92961fe5bc18f4d6c09154d0e2585b8bc4b9ac0928ced4f7f87d4d471137b7cf59f4d99b4aa29eb543e5a3dd3e11520baaf841481f1bd1f76cf0dc166e7dc4cf43dfcdd65d4fd4286a2cb745d291b2d399f07c53c038bcf1de76af6aa1f9e2d9d1c655d02e294030547519f1641bac2392c84d516b142d5bcb0e9b0ea983e3752314d774b912624858e0389952e2fa1949311b1304936efde7df0e315b87b908f6e26b35c9d2e1a9e4887b6a77f13552da60590b67793c9c929c95cff0412", 0x1000}, {&(0x7f00000035c0)="52aa96c3437cd3ee7fbcdb2ce2425c361806fd277b5abf9356851ba8a55e9e301b489eba526a1679f54172", 0x2b}, {&(0x7f0000003600)="897f4727d2f46add927c551b6add7a825be1e2b5e388f42113c68a97d07c32d4608924c2b898d59249f46dae2d118258128dd739675cf4ddc70e9d181ae278e60e2e5d3ae8d3407e0bbf7161fa4f582230031cd8184cbc09e469f29dca4d77d87f5d04be7cbbff1d473040336dfa718f4e7f686c83278acd1bdb32085d3bbaf8f25f0bd23c92c03dc1bc052c8b3d156f23cfc185aae0b505d486fcbf", 0x9c}, {&(0x7f00000036c0)="48d2e6fa8a8324429b28101117b3dfce03da080ece931898b1ed6a1fcdbe7e7ed51b89f7f5544355bdbc8a6b663b45f0c058688852f5952a8166834aa2083b0597715e490f1ba4a58ac75822636b17612361c43af6f5c8dcee67040501c8a82c08b67170e181d5a601dcec5ce042ed26c4f93b66d0324273e70ff3aa3486a9fdce6cf06ce02637fa1c741662546a5782623f1150bfc9fe28c16550ae26bb7b30386e4a29aef661f4712de73c8ef3f9ecbc4559409c0cc8d37d3ba73840f96c", 0xbf}], 0x6, &(0x7f00000039c0)=[@cred={0x20, 0x1, 0x2, r31, r32, r33}, @rights={0x18, 0x1, 0x1, [r34]}], 0x38}], 0x4, 0x20000880) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) 05:19:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:08 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x1, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x40a42f, 0x8000) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f0000000080)=""/236) [ 323.972664] overlayfs: filesystem on './file0' not supported as upperdir 05:19:08 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xc020660b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x60000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2d00000000000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) r0 = accept(0xffffffffffffffff, &(0x7f0000000080)=@pptp={0x18, 0x2, {0x0, @local}}, &(0x7f0000000180)=0x80) getpeername$unix(r0, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) statfs(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/168) 05:19:08 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfcfdffff, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)) 05:19:09 executing program 2: socket$inet_dccp(0x2, 0x6, 0x0) 05:19:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x9000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) [ 324.290523] overlayfs: filesystem on './file0' not supported as upperdir 05:19:09 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0x5452, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:09 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\xa6', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:09 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x4c2000) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f0000000380)=""/135) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) r1 = msgget(0x1, 0x400) msgctl$IPC_INFO(r1, 0x3, &(0x7f00000001c0)=""/203) fsync(r0) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x4e24, 0xcaea, @empty, 0x80000001}, {0xa, 0x4e23, 0x1f, @dev={0xfe, 0x80, [], 0x20}, 0xe0000}, 0xfffffffffffffff9, [0x40, 0xffffffffffffffff, 0x2, 0x7ff, 0x4, 0x0, 0x36f12e23, 0x1ff]}, 0x5c) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000340)={0x4, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @remote}]}) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000440)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$CAPI_INSTALLED(r0, 0x80024322) pipe2(&(0x7f00000000c0), 0x80800) ioctl$TIOCGPTPEER(r0, 0x5441, 0x8) 05:19:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:09 executing program 3: timer_create(0x3, &(0x7f00000000c0)={0x0, 0x34, 0x7, @tid=0xffffffffffffffff}, &(0x7f0000000180)=0x0) timer_delete(r0) mkdir(&(0x7f0000000440)='./file0\x00', 0x100000400000080) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000480)) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x8201) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000000)) ioctl$UI_DEV_DESTROY(r1, 0x5502) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000200)={0x0, 0x2, 0x10000, 0x2, 0x1, 0x9f, 0x7, 0x3bb7, {0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x14}}}, 0x80000001, 0xffff, 0x8, 0x66d6ea0a}}, &(0x7f00000002c0)=0xb0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000300)={r2, @in6={{0xa, 0x4e21, 0xc96, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xab5}}, 0x200, 0x7fffffff, 0x890}, 0x98) 05:19:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:09 executing program 2: mknod(&(0x7f0000000080)='./file0\x00', 0x200000006, 0x6) 05:19:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x60, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:09 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0x4138ae84, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:09 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0xfffffffffffffffc) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) r0 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x534, 0x40) ioctl$VIDIOC_G_OUTPUT(r0, 0x8004562e, &(0x7f00000001c0)) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400000002000, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f00000000c0)={0x262, 0x2}) 05:19:09 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\t', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x600, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf83f00, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:09 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x7, 0x80200) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x36ccbc38, 0x0, 0x10000, 0x10000}) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40106437, &(0x7f00000000c0)={r1, 0x1800000}) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 05:19:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x68, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) fstat(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000440)=[0xee00, 0xee00, 0xffffffffffffffff]) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {0x1, 0x5}, [{0x2, 0x3, r0}, {0x2, 0x2, r1}], {0x4, 0x4}, [{0x8, 0x2, r2}, {0x8, 0x2, r3}, {0x8, 0x2, r4}, {0x8, 0x2, r5}], {0x10, 0x1}, {0x20, 0x4}}, 0x54, 0x2) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) 05:19:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x8, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:09 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:09 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0x4004ae99, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:09 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0xc03cbd3fea63ec4b, 0x33) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000100)=0x1) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x200, 0x0) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000080)={r2, 0x0, 0x2, 0x9, 0x4}) 05:19:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x2840, 0x0) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) [ 325.119409] overlayfs: filesystem on './file0' not supported as upperdir 05:19:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:10 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:10 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0x41a0ae8d, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x5, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:10 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x9b, 0x6402) ioctl$RTC_UIE_OFF(r0, 0x7004) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x1ff) 05:19:10 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x4c21, 0xe0000) r1 = getuid() fstat(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r4 = geteuid() mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x20, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xd7d622e32c7c1465}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}], [{@appraise='appraise'}, {@seclabel='seclabel'}, {@fowner_gt={'fowner>', r3}}, {@euid_lt={'euid<', r4}}]}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) 05:19:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1200000000000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:10 executing program 2: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) [ 325.462423] overlayfs: filesystem on './file0' not supported as upperdir 05:19:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x1) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1) 05:19:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x8000000000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:10 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:10 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0x5460, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:10 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x20, 0x3e) r1 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000100)=r2) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x102c0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000180)=0x6526) 05:19:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) 05:19:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x5000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) r0 = creat(&(0x7f0000000080)='\x00', 0x40) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f00000001c0)={0x2d0, r1, 0x400, 0x70bd25, 0x2000000025dfdbff, {}, [@TIPC_NLA_MEDIA={0x84, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NODE={0x40, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x552e}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}]}, @TIPC_NLA_NODE={0x4c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x400}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000001}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_LINK={0x188, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffbb35a446}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9ed1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe35}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb92e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ce7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6be}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}]}]}, 0x2d0}}, 0x41) 05:19:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfdfdffff, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) [ 325.810588] overlayfs: filesystem on './file0' not supported as upperdir 05:19:10 executing program 2: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x200, 0x70bd29, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) 05:19:10 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0x4020940d, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:10 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x68000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x4, &(0x7f0000000080)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x11}]}, &(0x7f0000000280)='GPL\x00', 0x3ca, 0x1000, &(0x7f0000001100)=""/4096}, 0x48) r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0xffffffffffffffff, 0x10100) bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e23, @rand_addr=0x5}, 0x10) 05:19:10 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = accept4$unix(0xffffffffffffff9c, &(0x7f0000004940)=@abs, &(0x7f00000049c0)=0x6e, 0x800) sendmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f00000046c0)=@tipc=@nameseq={0x1e, 0x1, 0x3, {0x43, 0x1, 0x3}}, 0x80, &(0x7f0000004100), 0x0, &(0x7f0000004740)=[{0xb8, 0x115, 0x401, "59baf0e0bef3d7c9655b57e79df00eabfb7380a945f61a1cfe15dbf555ae1ef9f18e8729d1923b3fabf92f7a20aa3db96eb81af2a568cf16e07dac943e98a4b5e5543287868f756ae3440f4492c7253a40d732cdbda1a801c561752b27c2465402720fa9ac51f031e8c56e8c8cee1cc5535ef85e6ff18746cccb3e08125800517ae0b0fa0e4acfe405a84f730edcbcdf6dc3ec25a34f6304dac94075cc4722d54b3848d7d3"}, {0x40, 0x11f, 0xc9, "21557d9429d8505a10567114abe8975375a7058f3537fab48447787719874350d3d17a49e391f8530fe15bb2a67c"}, {0xf0, 0x109, 0x2e, "ea53531c1a40883a7bc8c3bd1e3db8c8ac8cb227f487fc81e87c3c7de201df191e61c53e4af887cb88f827b6108007298c85663058df2894739362461aaff47ea14490b714ecf417ef575cb94a265239139db1e092fd93531afef0fd3694cd8da417443e387905aa4fb0196ebf03927aeb6138080e430fd693dc7915c1db225af3317b79ed3e8a2530b096bdb1b288d2fadc57a7bb0f1ace401f2f126e1c25b0d8f8e4b4b5631ebdc11672f685f3eaa4bcac6b8fec0438cb9b419cc21aaff4cd7b567662aa98b69528eec807e45b6717eab690a8854468e15ac8"}], 0x1e8}, 0xffffffffffffff7f}, {{&(0x7f0000004a00)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x4, 0x3, 0x2, 0x0, {0xa, 0x4e21, 0x8, @mcast1, 0xffffffffffff66b6}}}, 0x80, &(0x7f0000004b00)=[{&(0x7f0000004a80)="9736af97460ff3484ea98756f8ee187fe0263df1f5f13c1a62fe07669469ae1c3cdffad2fde5164ac4d17da291344fb0f1f2fa3f318f7fd6af96ee16da3d719fc3fd5a91406f3b3a53584970ff2f1837f881191675c6a7a1", 0x58}], 0x1}, 0x80000000}], 0x2, 0x8000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) recvmmsg(r2, &(0x7f0000004440)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)=""/70, 0x46}, {&(0x7f0000000180)=""/60, 0x3c}, {&(0x7f00000001c0)=""/109, 0x6d}], 0x3}, 0x8001}, {{&(0x7f0000000280)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f0000000300)=""/36, 0x24}], 0x1}, 0x5}, {{&(0x7f0000000380)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000400)=""/41, 0x29}, {&(0x7f0000000440)=""/24, 0x18}, {&(0x7f0000000480)=""/150, 0x96}, {&(0x7f0000000540)=""/35, 0x23}, {&(0x7f0000000580)=""/237, 0xed}, {&(0x7f0000000680)=""/32, 0x20}, {&(0x7f00000006c0)=""/44, 0x2c}, {&(0x7f0000000700)=""/243, 0xf3}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/121, 0x79}], 0xa, &(0x7f0000001940)=""/32, 0x20}, 0x5}, {{&(0x7f0000001980)=@nfc, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001a00)=""/210, 0xd2}, {&(0x7f0000001b00)=""/33, 0x21}, {&(0x7f0000001b40)=""/219, 0xdb}, {&(0x7f0000001c40)=""/53, 0x35}, {&(0x7f0000001c80)=""/19, 0x13}], 0x5, &(0x7f0000001d40)=""/221, 0xdd}, 0x3f8f}, {{&(0x7f0000001e40)=@alg, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/131, 0x83}, {&(0x7f0000001f80)=""/140, 0x8c}, {&(0x7f0000002040)=""/26, 0x1a}], 0x3, &(0x7f00000020c0)=""/58, 0x3a}, 0x7fff}, {{&(0x7f0000002100)=@in, 0x80, &(0x7f0000003580)=[{&(0x7f0000002180)=""/4096, 0x1000}, {&(0x7f0000003180)=""/59, 0x3b}, {&(0x7f00000031c0)=""/194, 0xc2}, {&(0x7f00000032c0)=""/162, 0xa2}, {&(0x7f0000003380)=""/75, 0x4b}, {&(0x7f0000003400)=""/173, 0xad}, {&(0x7f00000034c0)=""/176, 0xb0}], 0x7}, 0x4}, {{&(0x7f0000003600), 0x80, &(0x7f00000036c0)=[{&(0x7f0000003680)=""/14, 0xe}], 0x1}, 0x690}, {{&(0x7f0000003700)=@pppol2tpin6, 0x80, &(0x7f0000003e40)=[{&(0x7f0000003780)=""/155, 0x9b}, {&(0x7f0000003840)=""/97, 0x61}, {&(0x7f00000038c0)=""/115, 0x73}, {&(0x7f0000003940)=""/176, 0xb0}, {&(0x7f0000003a00)=""/205, 0xcd}, {&(0x7f0000003b00)=""/252, 0xfc}, {&(0x7f0000003c00)=""/210, 0xd2}, {&(0x7f0000003d00)=""/192, 0xc0}, {&(0x7f0000003dc0)=""/117, 0x75}], 0x9, &(0x7f0000003f00)=""/176, 0xb0}, 0xc1d}, {{&(0x7f0000003fc0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, 0x80, &(0x7f00000043c0)=[{&(0x7f0000004040)=""/146, 0x92}, {&(0x7f0000004100)}, {&(0x7f0000004140)=""/120, 0x78}, {&(0x7f00000041c0)=""/21, 0x15}, {&(0x7f0000004200)=""/216, 0xd8}, {&(0x7f0000004300)=""/190, 0xbe}], 0x6}, 0x4}], 0x9, 0x2, &(0x7f0000004680)) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) 05:19:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xc00, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:11 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x20080, 0x22) write$UHID_CREATE2(r3, &(0x7f0000000180)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00', 0xf3, 0x5, 0x8, 0xffff, 0x0, 0x8, "b28617d6cec6f14188fea7ee98f09659627e144ae331e5c5723059c130d86115c7115539ba6fb150d23f1b9d11879b6bba4cab440085b8549d68c702b0d21a0162cdaf075ebec6428d56dfa84814678265afaa709c706e191d31fae79ebb07a4b54b9139800a3163c88f7b38826afb33aec174d6f5c687033b15639fa1fc868ee583757cf35c34040a79bcdfa84b0f48fd09c82c962467ef67e5e85555c1e81416b8ff20c182192d89dbfa9b49c2811eed98c2c1f0e1c766ea88142abd3c64386b5c2cc8a0a781c5b1067ea087778db26565c5dcf1164499f22d2f3160c8fd4de136c3722515ba9ec65bb389cd06df304ff6e6"}, 0x20b) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000b82000)={0x10000004}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x0, 0x0) epoll_wait(r2, &(0x7f0000000000)=[{}], 0x8e, 0xfffffffffffffffb) dup3(r2, r0, 0x0) 05:19:11 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae74, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)) r0 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x10000000000e86, 0x10000) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000080)={0x60c1, 0x3ff}) [ 326.228460] overlayfs: filesystem on './file0' not supported as upperdir 05:19:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1200, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:11 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:11 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000080)={0xe, 0x0, 0x0, 0x0, 0xfffffffffffffd09}, 0x10) ioctl$RTC_AIE_OFF(r0, 0x7002) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000240)) 05:19:11 executing program 3: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x10402, 0x0) write$FUSE_POLL(r3, &(0x7f0000000100)={0x18, 0xffffffffffffffda, 0x5, {0xffffffffffff0000}}, 0x18) r4 = getuid() setresuid(r0, r1, r4) write$P9_RGETATTR(r3, &(0x7f0000000380)={0xa0, 0x19, 0x2, {0x268, {0x11, 0x3, 0x1}, 0x182, r1, r2, 0x4, 0x0, 0x3, 0x10000, 0xfffffffffffffff7, 0x2, 0x5, 0xfffffffffffffffa, 0x9, 0x6, 0x10001, 0x0, 0x401, 0xffffffff}}, 0xa0) mkdir(&(0x7f0000000000)='./file0\x00', 0x24) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)) 05:19:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4c, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$alg(0x26, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x2000, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x8180, 0x0) recvfrom$rxrpc(r1, &(0x7f0000000180)=""/29, 0xfffffffffffffee3, 0x20, &(0x7f0000000200)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e20, 0x65d74308, @dev={0xfe, 0x80, [], 0x28}, 0x2400000}}, 0xfffffffffffffe5f) getitimer(0x2, &(0x7f0000000080)) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) r2 = socket(0x40000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x2721, 0x0, &(0x7f0000000000)) 05:19:11 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xc0045878, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) [ 326.570956] overlayfs: filesystem on './file0' not supported as upperdir 05:19:11 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x147b, 0x49c33b7601633492) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x6}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000280)={r1, 0x6}, &(0x7f00000002c0)=0x8) r2 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000300)={0x0, 0x0, 0x1, 0x0, [], [{0x2, 0x4, 0x65, 0x7, 0x3e, 0x3}, {0x6, 0x9, 0x3f, 0x4, 0x4000000000000000}], [[]]}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) accept$ax25(r0, &(0x7f0000001a00)={{}, [@rose, @null, @bcast, @netrom, @netrom, @bcast, @rose]}, &(0x7f00000019c0)=0x48) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f00000000c0), &(0x7f0000000180)=0x4) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000440)={{{@in=@multicast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@empty}}, &(0x7f0000000540)=0xe8) ioctl$VHOST_SET_OWNER(r3, 0xaf01, 0x0) sendmsg$xdp(r3, &(0x7f0000001900)={&(0x7f0000000580)={0x2c, 0x7, r4, 0x3d}, 0x10, &(0x7f00000018c0)=[{&(0x7f00000005c0)="fbd5e69cd14eac18ff2912cec4727ce0e848469afc2fe9e5695275c160625c1bcc0770ae88b20ed88104917ca57e0a2a19b70b9a4a5c3619dae514ad05b4133154957c9a1a72b43d4f4b784572074c9de8739945232c9c5018b7124f1634a4f1c071eece0f86fe25ad0d357366e98c7a18f861c74cf1c12768283b0d71609e18010fe99d6c8f69f64e352f5c31c25849b4f84438976674973d6cc24b21183d104813e3735b57e2c78ec0869dca19110af564934d376f5c8e0e930d55c76cdb7b2d2c9b8487720e2034ed10859d25c6afcab4f6316d46cdba6fef1da6c2aadf1b631f81e952b5bfc8f17b1e648c07ae0b", 0xf0}, {&(0x7f00000006c0)="531edfb12c924464be70f6fdbdc22cea746c9610d2a2d7b1125c006d0e2c44ecf1ff0b4133583901871013c7d69406d00192b413a9d612229cb62f328923bbcf263a39fe0b71d4fa87ba8bb4dd40235c4290408a358e970fba63451afa02162958a76f7482bedea0af86ff974b73833fb0f70f14d6b06452cc0aae791504c370ea54e11752db9bc1fe4dc18a5762a842a6ed496a36df8540c34d70a57f4a8c67ae9c26415d6ee6e9334f10543d05c13433eb394c00afd57d2d6a600fb812d460b0b0a69152f504ef29538d1e3a12d43f30c956522af28e8ffd0d8a3a3a5cdaf8483a", 0xe2}, {&(0x7f00000007c0)="bbba64f0d123b038bab3c834dc025e1f998fbbe2257cd2351e9e676bf72d6a13c6887801c8e4949bad584f05093736502f8cb01a26c2070632d5805949bb5002dbd558739cc150e1f570d370a3b9dd6a6a2fbae9ee9bb0c6b7a01d47d40a4b1ea7b8b0e4fec65f01be933fff8ae2272a03dc25d5944335bb2df7be35c93728ab2e4286c8dff03515d0e9b3faa7548873acd1ac642103e08093b91d3cdfe1f57d292626b32e66c9451d7571f89c63b998576d17667d57eca30e6e428c032462451cf433457861a2f915c6278121506491a9e72b5b3a9cae3db09f075860888a65b8c12494610f52cf2a01a27037aecb3e5f2b785612e0073633739b8b218b7dbb522e9b015eaba33b49467864d7a31aa5d7eb1796b22a6d6531ffeb609b50999b8c5cdbdcfa638d1a490112c2c2d9f4f9d34d26421adaee890041a6877465c645e43de27887023e3432cd5a07cc57dc85efeb5bf59863701a96eca240b770744d5a88d67c93ceb613e6398970fc93d33d99c61c3cecadd24f81a0e65dde3b0fba6e679b95cc9200f7e8186c2bccda09ca82e055e3c84dff625abcdab206e887e1adae58bd77e9d9748663bab0f0f38acb8f4bc2dde261f0ed01ed9cab329b6f2a6d52f4d2f131352cc76bb1d3cd8e59f1dd2bae968a925ba40f3e1ecff195d3236f4996b25bd2e721c0f04fff68745e3aca0a8d2f43da2557929bebf7524e01a6d92029c5179c376adf751a89d58cc15d4192f1e872032bedc8b0f4148b1901898cc11f66a6076772276633d699e85148700989463d091b9fefaab1c369532be9fdc3767ad03815015d3f716fddc78fb9d3743bef03c23c9a0f2a15942c23fa973f54dc2c19499b2bcd5f207e4315900ddc156afbf96604d4b24da4809d66a79ac611c7e520804880a7d0a5ef94158c3e461f82c158d39832cd6872b5e61cdce5a0da54f1a4182ef4d22e2d7e6be453f2116797475827af9015a4ab8fbb3c1132834030c1a34263af8041ec278e5ac572079227891526ec632485a17a0af539873363f38e87bfa82b8dc339c5237a0980f51cadb7b53b537bdbde2c2fe05df18761f0bebc960c2043cc0494885a0be75813f187a71d034046d822021ead38d1de5174d8694a14fc40b3f0321665efabaa70b81c5a03554418112ebe935e244d090a959eea568fd946a1921be87134918b157619895bd76f4874f9cb93fa5b83e2e76e75999aa6fd86e0878fed3847c9d28357ea8e5686afcc2bb9bfbbcfddb11c6ab8f2645e86814ed5c410665991607ae7ed54e2bf0f0949c14e571a545a5b717c28970ac49608ca0027703e0cc3a1cbd1fbd0ed541533c4e0746fe4efe031ae7ae7e42b160e3b95ca9e14a7238e7aabf8a07d1c6e7691e44f669ecb639d1434daa228f41b151ed57b90b16d5513bfbb688846bbdb862202e868753faeab5bb62e4ed925a08fb0dadf968e1d226b2881d324cda11e86fa223068b0c724c93654aa08c378d8532f07b28af5cfac0729af09000b62fba5b80c7fd2bf23ac39131bf3076a782ceb760408612d2607bd5f181498c4e1c57ce66ce18d896d3772db6bab3f3c312692414ebe8f82a01fbcb8c475d857e79cc594c637d59c1a0739d05593a2bd9195bef8d6335e9059a320262226f3ff2f6e7a2670f8878779ba857a5d3e5d68251ad410678833be35e2e4132ee5b7179acc013017f516bb9c62075be120ae28e936f041012301f2b2fa7fee0ec4e5e2de911ae2ede36e1eb10eca2840bdbf859e9cb7f739b5f55633e1efdb5a535c6480c8b348eb3ded45988a31f96096bc7aead4097bf43015e6e124029e6d1ec595314d501fc67e8a264a59349dacc104e571e381357a631d903e21ea3b3de7d291d89fc5b6548d5304ffc4e58f5c12fc8e9222a3d145cfb898e39db5b90837a1bf20b47f6652e235900e84f945c008d3545aeee5bfb3717516e3781ecbef5c32e65a3566d91a71c0ad30d8f19b0a394d41a1fc990648b769eb010ab2e3410db0fcc1e6d9d60a04f1f1ef7df12a30b7c4de55bf47c0c8021370f9ae4c1090d458e6c3fc8a1d856054c6b89065c7fa9d5b50b141ca87109f8404f3e42bd9de380a3c7f6fe5bd6cbae3bdc190ab9b58c7b64a41641269b8b2f4d578426e450f2e12a144ada600b8870c0fab8d3c605882eb662816d07e4912ad2c525b2cfccb5b66a9cf0007ce5c68a0fad6c155b0195402f0ac4089e6e964923249d8d3df954c3f2054e8756685e101e9f3db361e16e00fc7aceebd9a32e43ec1591384a1f7e559b8691844a6b9ad45f7478ff96ce85611c75faf655946e97152b27aac7a18e4d67473e1e907f01c213c3aadaf7376f820abbead656e8ba4668f5a3701a0a40a44b03d47b4a6851b768d973a1ecdd749782828ac5ddede6c3218f9acdc093ec87ca6a4d1a6b3a2568c81a76c8ab7bccf11890d563ed9db14e3f4e575482a3dd3f542ed77d590bee63b9f0b2cb5816c80f69bd23e68bcf0cb4b3c60e2b7cec14cc6e6b8bb8b83613f396e8ffdbdcc836d9637bc18be0d88eb4541f190a16a460f9a85322947e77460ce4a8e59b60e1c79844fe0c04109f25d5b53f555af6474fe37e182c62376ca588343401300149d55d1ddbd0bdfaf1b7a3834cae3b791717244908f6037a9d71f29d64c8b0de437b45f448d739439d7cf94261c492e668aadec4315b0cf2bd7d00fbbace618593c1dca4758f517636b0eac605e25e9ec5a4989f84a8364b9fbdfa965543fc65eb2a198d7d3e119fa763db35a2a4df42605780899dda813afc014fc419cf2f19c11111dd69589915924186c70f9c6377914eeb66bbe742f584a9bc214cdd61052638b15973f877e1e4728d13caabe10f78f1d7cb882ac1473c0e2bd3ab9510ce785862b1ca6007c538675af331cdb0d4da1db5459344636436eddb2fed257589c08a1604bc7fdb05887f964c12eb933944727b604bfc67dadc3d61a1de3a1f1082c2b487845952fdb28be2dfc85af581042b0f6158b630c9737288ae3c206430f145dd96ca75fdf81bb844b7c327987d8409e5d2f449542f0a277c96ae771fa47bb8d9e98839e96b98f6a0258937fc6aea57b3d1e2fcd5b9d456cf79f3b9543ffcc6a1036e7081e969d3aa00379d8e1be430b5a01f01888d2a8bb35fbea24b9dc7c17406848420259993166afbb496d0a81e88590b87e9182754654a71da839ad71349a741924e2bbfdb12a1c4cce76b55ca83c52def32e0339beb56977c88ce7400846a564df8af3dff3fab6e6965b4bb0012dcfee4cb31ea912f6579fa693c91db26561b07220115852d197741a819570fde44ec39d8d6f3ec29870eee33ba0153ec3884227826d780f127bff9a6fb354f2110134d118911b622dbdf9427bdc7dd8e8b32e497095837d6a7c746471891faee30c96ee4753e189cedad5e887a451c4ed3eef859e344dfdcabec097d66e46f26e215fa715601113ad436c949364037759fa2a0e7c77177ea1c182f326b57211fa9f971fb1f5b6c710ed8e86bd1872a34fe77584515fa23de15144188b448a695a5518176dda29a8ed1296d3a2a9274b2fde86d0e2fd9021a6b3cc069593f7fb2de4f87eddde9aa6177f5c122d2956f57f0f34f7eea441ed19e0b76cee926048a1234e778f4a07dc3496a8d8326d5cced8c2597fa5d8361683f01dd620a8b8d31e24d5e0cb6aac1a669e6e856de420859423d541bbd59710ff422fffdacabd91f64534579a434f3649cccd0c82f4397f0fb701b0259f07cb95499907901cb8d2321cfa648cdf72367b3cd3cc017a2b7ffaaa094746ce4c464bfd94097dcecb07c9ad056c33620b681bae60b19f02998e6bb4b68e823e1f3f0f32f2c5a5d615fa8de45e36a6b4a0a16164c8c6033b124c7ea2fe76a06c7a02434366165efdb6d0d3947cb774f3d76ca7c9c33f5f46d22901def4afd1fd442c0180925c81472565695fabe26d276a87c1e248100662fd073215ec17157a183ba990573dd17035b1f67027bcca966076e8030471486ba9a0b1e96651d0287c6e8befdf15e3b455e25f9140eb011b1f8bbea099568492dd52483748b79cc81bd737b26de53aca8d5cd873170445f5944c7a770bbbe71ad203375a25be4a7a364aec3062285733f6664efd03b5cfceb2fd2234f02cd1adcf1d33e38f1a76e43143cdf057546171770fcdbd4897b68590e5b63ae0cfa9920c8f900bd487daab711de31a49cf64f4f5ab8f9f85cf209da04cfc09756ea123affdadbc2dcfcb2a310a1dd5c93a5022eaf559149046ca81f649dc192bedbab0c2a40ec2191becc2f1a22b67609aada538404a60850910e211f26f6d1526c184be7e60946d285984a50b4944d66fc57973f8a6c9349d0ccb42292838161456431485986cf4781b6dd441c82d1b8fb5d3d404f6c901d42bfad1698021c381bf0bff84c0e56122e8913dc63f8aa72eea7b8e0a3741b62595366f335693c59a0e91bf0c6c0c6a05a886e2ad2d31e3fa4d4763742785d2b40952566be095089596b301cf28a87ca98d06e535ee3f0b11d58a81ed4208c35a8522ff98e23c76c53982f60c32a3ff036d4d969028e63abb9a662402d4c4626fcb2ae1baeab026cbc39e7404639150ab6e276836969610068b5af5e119a720baae3d60ad47f1a2cab47ba2e4a0625bd71416c842467022a9bc86b88b52132f4c7df72a0c508b19009c4734a4f501ef08472f2220256233bafcd67f4b62beca14dcfa260770110bd9abd8c5f19aa540d40a87ce856c8f4e75120c14e7191523696cf3d97b0b8b6c7bd688fcd6e3eb79d2d27026d2ea127e45c9e47069e46cc7ce4a5219fea8889aae91e782c0202458cba0ae7219c3aed0970b4342b67c93c8359c09fdcab131a32b65f7e8155d8dd6a2dc86c0e15ac0abec49eb96616069937ec4ad91a3d6879690a3b2ddc9258ac05f23a1fa364b5021b18fc6dfce7f49a744f8019a100733a121d66d6a5b5df983adea0174ceea4cd97dfeba05c30166461f7920258b6b87c2e2b35a7828c5a8c1979fe0812e9d9f46033b2c8a70a2e8fa115da5fc7e7d2640cb3bc9164897279b09f8ee150e26995a7df592f2c4437bd00fa5e87c1f299ad1d5ddabd32c07908d963f0e0444dd394b5bfc95cd1e052aec0a5601d0aa9f987c0926d5b123aa3230102b5d9504e36c261a200ec8463669f489b5e3629640003940ca8862d1fd51952153f05e62437ff8602704df298a54c26597e3d79b51dac326db20c8db23710ce4a2704bc6f8ccc158fe3afcdfde5f62029caef041031e426af749705746c28b7b100173d12e7eb6800b32bd150bdbb0569692d450c911ea2f434fd34bdaea4e50cbdbafc742ea2def6939e192e02fae8dff406c5563f3e26f3100892d6b7e10d4255f5614cb7799986c3547ba31890346b99e78646a14647f863238bc14a1eb675ff3352464b8e1da325fcceb0dfa966634daa9ffbf4d651e1c6997555594263f370e1f13b53aa05c2fd38dedd4284b3cd49fbb4c357f0400d79f796d81610201211e44161bc2413990de610337d97ead075669e690fc6dc36155b3be4725713cb9d70387f873ba351649d4c590c866721b7af8ce734e58a338ecf67acfca29cdec6569432aa04fd533ef07e1f046da78d77cec5651644897e0fb10dfca58313472c380db5481630b4f68b254c40e90d6cd29001c59c92c47688ef2dd3963a7500409ab97ff9aa8f673850650dfa31feb5ac9a660f9e51693e7524f3f20b7d28b14bf22c7150ee02c5bc861ea97fefdd581b7022d9b61073c4a4afe", 0x1000}, {&(0x7f00000017c0)="e826e8b4d4c3b48cc5f4466500b706bce6e469fa033c5806d9b7479dbb29e591a78068a9a8944c99cb64d8212d98bc9bb3a0605d9a8b9b781d54b7a7fb529595c0ea1c55ce59eb7c833f2c620f1c557c725fa61d9dc23d5b8e7c02a627f82ad2e3779c1c64907fea7a62555319f73a1835172535f72d22c94898e1ea75dc561d5fa58020bfd508bfaa5538060bfca5bbd480cebc1008dba7aa75abe512b114205605d66d81cfc2787e68a6a9424748bfe1e717d559c0db8dc12d93b23ab0a6592fe4c62b8b439b5129544c48b87c32fbc83e33dba4fd71c2c083163b6129c1ec88c25ba58f9e2dbb3e15cee3322e9e82b96f", 0xf2}], 0x4, 0x0, 0x0, 0x44}, 0x4040080) 05:19:11 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) [ 326.739554] QAT: Invalid ioctl 05:19:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x97ffffff00000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) [ 326.768317] QAT: Invalid ioctl 05:19:11 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) setxattr$security_smack_entry(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000240)='./cgroup\x00', 0x9, 0x1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) get_mempolicy(&(0x7f0000000180), &(0x7f0000000200), 0x6, &(0x7f0000ffd000/0x1000)=nil, 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) faccessat(r0, &(0x7f0000000080)='./file0\x00', 0xe, 0x1) r1 = syz_open_dev$radio(&(0x7f00000002c0)='/dev/radio#\x00', 0x3, 0x2) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000300), 0x4) umount2(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000001c00)) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x800, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r2, 0x54a1) io_cancel(0x0, 0x0, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x480, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in=@local}}, {{@in6=@remote}}}, &(0x7f0000000100)=0xe8) prctl$PR_SET_SECUREBITS(0x1c, 0x12) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 05:19:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180), 0x4) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x42002, 0x0) close(r0) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x20, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f00000000c0)=0x200) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)) 05:19:11 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0x40049409, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 326.854615] overlayfs: filesystem on './file0' not supported as upperdir 05:19:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf0f000000000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf8f73f0000000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x4000000000000000, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000000180)=""/140) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f00000000c0)={0xffff, 0xc, [0x2, 0x8, 0x0]}) 05:19:11 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:11 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xc0045878, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:12 executing program 3: mkdir(&(0x7f0000000480)='./file0\x00', 0x10) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, &(0x7f00000000c0), 0x4) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) ptrace$cont(0x20, r1, 0x0, 0x100000001) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0xf4b, 0x0) ioctl$VIDIOC_G_JPEGCOMP(r2, 0x808c563d, &(0x7f0000000340)) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000300)={'vcan0\x00', r3}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x200, 0x0) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000200)={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x7, @random="0dc709715ad4"}, 0x20, {0x2, 0x4e20, @remote}, 'veth1\x00'}) 05:19:12 executing program 2: setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f00000000c0)='\x00', 0x1, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000140)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000240)=0xe8) setuid(r0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xedc0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x0, 0x100) r2 = syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f0000000300)={0x3, r2}) 05:19:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf8f73f00, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2d000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x80) 05:19:12 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80800, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000040)) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x40000000006, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x5300}]}, &(0x7f0000f6bffb)='GPL\x00', 0x80, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 327.320480] overlayfs: filesystem on './file0' not supported as upperdir 05:19:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:12 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1f000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) 05:19:12 executing program 2: sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000440)={&(0x7f0000000180)=ANY=[@ANYBLOB="0a062abd7000fcdbdf250100000014000300080007004e20000008"], 0x1}}, 0x800) r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x800, 0x2) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000140)={0x3, r1}) ioctl$VIDIOC_SUBDEV_G_EDID(r0, 0xc0285628, &(0x7f00000000c0)={0x0, 0xfff, 0x8001, [], &(0x7f0000000040)=0x3ff}) socket$nl_generic(0x10, 0x3, 0x10) 05:19:12 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x60) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) r0 = socket$nl_crypto(0x10, 0x3, 0x15) fgetxattr(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)=""/108, 0x6c) r1 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000000c0)=""/53) 05:19:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) [ 327.652801] overlayfs: filesystem on './file0' not supported as upperdir 05:19:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0x8) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x30, r3, 0x300, 0x70bd2a, 0x25dfdbfc, {{}, 0x0, 0x4101, 0x0, {0x14, 0x17, {0x11, 0x1, @l2={'ib', 0x3a, 'eql\x00'}}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0xb) poll(&(0x7f0000000200)=[{r2}], 0x1, 0x8) 05:19:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x48000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:12 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x7a00) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000180)) 05:19:12 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xc000000000000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r3, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r4 = dup(0xffffffffffffffff) ioctl$KDSETLED(r4, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r2, 0x4b32, 0x0) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) r5 = accept$alg(r1, 0x0, 0x0) recvmmsg(r5, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 05:19:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x74, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0xffffffffffffff01, 0x90041) syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x473a090f, 0x20081) accept$unix(r0, 0x0, &(0x7f0000000180)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x4000, 0x0) [ 328.039494] overlayfs: filesystem on './file0' not supported as upperdir 05:19:12 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x500000000000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x40000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:13 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x20) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x200800, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000000c0)=0x1, 0x4) [ 328.287905] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) [ 328.325388] FAT-fs (loop2): Filesystem has been set read-only 05:19:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) [ 328.343036] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) [ 328.352555] overlayfs: filesystem on './file0' not supported as upperdir 05:19:13 executing program 3: ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f00000001c0)={0x497ccb6e9477631, &(0x7f00000000c0)=[{}, {}, {}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x40000000000) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) 05:19:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:13 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x600) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:13 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) delete_module(&(0x7f0000000080)='t\x00', 0x200) munmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000) 05:19:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xa, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r3, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r4 = dup(0xffffffffffffffff) ioctl$KDSETLED(r4, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r2, 0x4b32, 0x0) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) r5 = accept$alg(r1, 0x0, 0x0) recvmmsg(r5, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 05:19:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:13 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 328.700292] overlayfs: filesystem on './file0' not supported as upperdir 05:19:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xc, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:13 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0xb416, 0x2000) socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000180)=""/151, 0x97) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) 05:19:13 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x500, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0x0, 0x400001) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) 05:19:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) [ 328.940459] overlayfs: filesystem on './file0' not supported as upperdir 05:19:13 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:13 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0xffffffff00000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x5, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) [ 329.146230] overlayfs: filesystem on './file0' not supported as upperdir 05:19:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf0f0000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r3, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r4 = dup(0xffffffffffffffff) ioctl$KDSETLED(r4, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r2, 0x4b32, 0x0) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) r5 = accept$alg(r1, 0x0, 0x0) recvmmsg(r5, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 05:19:14 executing program 3: r0 = accept4(0xffffffffffffff9c, &(0x7f0000000100)=@sco, &(0x7f0000000040)=0x80, 0x800) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000280)='\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000a80)=0x0) stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000b80)='\x00', &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c40)={0x0, 0x0}) lstat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getgid() sendmsg$netlink(r0, &(0x7f0000000d80)={&(0x7f0000000240)=@proc={0x10, 0x0, 0x25dfdbfe, 0x40004000}, 0xc, &(0x7f0000000a40)=[{&(0x7f00000003c0)={0x314, 0x25, 0x120, 0x70bd2a, 0x25dfdbfd, "", [@generic="a33761453944d2274dab5c4c5864804913174b2468d8f2e2ca7a1e757c0382d880b68b8f6926bc8a17504c38dd097161c8e1a24a272546bd4cd7d254bb8326886d55c4a1fa4a28cc726ee1097f20fb6a3f718861593796c330dec43a9483e4384350b0b99f3ba5b80b9adb2a244372eb17187c5f351d33a528fd2d27cb8afaa836c0da6b4968e7717772e38674841ff3d1f30e002b4f4661b2be509d7024e64b220a37fd830cb95710b9e8123133737b3468a68f5d0dca8d6c507066de7753aa5f0230afcabf749a1f8523b47d2c2b6c6780ddfde413", @nested={0x64, 0x82, [@typed={0x44, 0x8, @binary="1f3c6db9a6d6ee8590bf231817bb62480af0f2bbde8512cecc9744f174fdb46f5470d3d2e0b061f289c45823b0b2ae32b5080a44e86cc25e5108925f93a0c6"}, @typed={0x14, 0x15, @ipv6=@loopback}, @typed={0x8, 0x8, @ipv4=@local}]}, @generic="d80c3b3ee1437f6a7f0f565bf1b54701c537ae6fca546f6af5f9aa7d6c947b86ac56445e7a92b88db2e0a999e0d0d1a94d61e43c28442fd6cee14a3c1f7803d25c785ccab5a8b3fb4b3eeba2e41a812867f327edd2242147825328ee7bee", @generic="36ec0308930df50c7df8a8c7dff9f51419a0f7c6392e890174501dc3579d7288c1ecfc20b8bfdb86ef4455284f295faa57e795547a6743d6ef531d9556c82f4826ef6fd9a8e09fa389cec9a112e6e2cf3a638f7a5502772a80d0a7785b61b213d9fdbbc4b5a93558f0fc9c2623364b96e290efc9126b03121a6ddc658e912eeffcca05ecb27e6d6079eb18f80ead95fd1b54e31ac0f5c92e78332e5b947b274d4c0d91d616077ae8503ad663aa9cafe98eb974219de5233ef4272e3295eda947ff7c819718ffccb74d5d2ac67facc6aa142f364144", @typed={0x8c, 0x7, @binary="a1c73f957c0eabebbc9de859a51d849ea287017f864f07c1122a516f46ca613e4fba4592035101732458ba60fe592e6e82c73872d22fa000dce10a30a9aeb35445afd1d40ab426b7c209da6f19d1bedf20a148b5ec0352793efe5f1003caf3bfce07ccec4aca4b737310664ad630747536d18c66303d13aeb415c41c1ddf52461de78a0feb8a5b"}, @typed={0x8, 0x95, @pid=r1}]}, 0x314}, {&(0x7f0000000700)={0x318, 0x40, 0x600, 0x70bd27, 0x25dfdbfc, "", [@nested={0x188, 0xf, [@generic="6bc84d21fe3cd19d50fa2f1e354b9844c755657b34fb5d850c668e5a20f2637b9e0568ce5aa8f20546f03bb07e65801332d1c394326c72803ed3a3a077c9bcd844899849ab227293e84892b917994d2d0fa9", @generic="59c280e6076bfe95a663b3c77253347d78d109a429af88fdfb7fe0b9d3400c559d8de8147fc524b2d83ae1adb2b47e0a93f07d8adea8a2ebfe62d63a0cadcc922e8894c95543012aeef45e587f8777f7f1e192f229136f9ef339ee61875e1f0d1c787dc9de8173ad35bc75940eba3037804a0d571514105fda79779bc01f4cc92e6c0780080b8d08e08c909f70e5d0bee2f6f57ef12b6e7e0bacdcef12fc57941b43e9264539282a6f9d67302fe4c18946", @generic="96cfb5f129e230aecc7b60fafbf79553f92f870f31e8bf67fda0fb5ec5ea26987769a1748dcfc80a303457ca24addeb7c45d9c296a7e7821e066c1af86508c40339dd219abf8176dbfb1e695b8b449a9efc27b095170b0d8ac5830c16acde31dcc2baaf2bdd49548b51b9a34faf96821a3f566d55b25455f6599eb2084d4"]}, @nested={0x180, 0x43, [@generic="0fee359234b8bc1f5bb64dd6bb00be94b1ca5030d0109648db9309ec001fb0c7c651d935419bd7852c6470121791a8c185b74e7c9e", @typed={0xc, 0x5f, @u64=0x8}, @generic="c5f9de2b1fc836169d82520adaf00aa94f0e4f36f40edf821e8befaf73b0c37eb1fdc16b3cf5b9f27fbd4339e92ccb0a5114758d75763cd824b32c4d4dc314d0637f098d815910a56d05dd72d5bdd1e1c340c65913cbbe76812f448d649c5cffca740e2f062130bb261996199e612bd9a212773d65ff70ef88c87a132f49cab3afe4e4cca4f60cd1fd63e0", @generic="2266560543d90ef8c7a19637053d288d2b1ef0d949ac264b9c5638739bb183754326ff3f585d5474cc556e581723facc58930513a3d0c2cf91106f4936da7ebb11a7251d004fd872509b03cba905c6632412b0b6180247713a6c9fc89104fc43c9ab3fe5c5860d2a5feff2d065e9ceda55db64b3bf7b60638a4e8fc0513442c2fcd50950d886ce0ac799edd88effd76c1e933e186393381ffdd3e1760b77276ba2a510a426d5dadae8f2e1e044a158f7"]}]}, 0x318}], 0x2, &(0x7f0000000d40)=[@cred={0x20, 0x1, 0x2, r3, r4, r5}, @cred={0x20, 0x1, 0x2, r6, r7, r8}], 0x40}, 0x8000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x3) r9 = syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getpeername$packet(r0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000e00)={@empty, @broadcast, 0x0}, &(0x7f0000000e40)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@multicast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000001040)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001080)={'irlan0\x00', 0x0}) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f00000010c0)={@empty, @empty, 0x0}, &(0x7f0000001100)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001140)={{{@in6=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001240)=0xe8) accept4$packet(r2, &(0x7f0000002940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002980)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000029c0)={'yam0\x00', 0x0}) accept$packet(r0, &(0x7f0000002ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002b00)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000002bc0)={@mcast2, 0x0}, &(0x7f0000002c00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000003000)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x51}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002c40)={0x35c, r9, 0x80a, 0x70bd28, 0x25dfdbfe, {}, [{{0x8, 0x1, r10}, {0x7c, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r12}, {0x1a8, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r13}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x1000}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r15}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r16}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r17}}, {0x8}}}]}}, {{0x8, 0x1, r18}, {0x50, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r19}, {0xb4, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1e050c7d}}}]}}]}, 0x35c}, 0x1, 0x0, 0x0, 0x1}, 0x40040) r20 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x2001, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r20, 0x84, 0x2, &(0x7f0000000200)={0x3, 0x2, 0x1, 0x3}, 0x8) 05:19:14 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:14 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x7000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) [ 329.591993] overlayfs: filesystem on './file0' not supported as upperdir 05:19:14 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1800, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:14 executing program 3: r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x5, 0x40) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f00000000c0)=[0x4, 0x2], 0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) 05:19:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 05:19:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) [ 329.860465] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 329.884155] overlayfs: filesystem on './file0' not supported as upperdir [ 329.899522] FAT-fs (loop2): Filesystem has been set read-only [ 329.942454] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) [ 329.978140] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) [ 330.010717] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) 05:19:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r3, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r4 = dup(0xffffffffffffffff) ioctl$KDSETLED(r4, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r2, 0x4b32, 0x0) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) r5 = accept$alg(r1, 0x0, 0x0) recvmmsg(r5, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 05:19:14 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x60000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2d, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000180)) 05:19:14 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) [ 330.059311] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) 05:19:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) setxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000240)={{}, {0x1, 0x1}, [{0x2, 0x0, r0}, {0x2, 0x1, r0}, {0x2, 0x2, r0}, {0x2, 0x7, r0}, {0x2, 0x4, r0}], {0x4, 0x4}, [{0x8, 0x5, r1}, {0x8, 0x4, r1}, {0x8, 0xaebdbbb864b359cb, r1}, {0x8, 0x4, r1}, {0x8, 0x2, r1}, {0x8, 0x1, r1}, {0x8, 0x4, r2}, {0x8, 0x1, r1}, {0x8, 0x1, r1}], {0x10, 0x4}, {0x20, 0x7}}, 0x94, 0x2) 05:19:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10000000000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) [ 330.142428] overlayfs: filesystem on './file0' not supported as upperdir 05:19:15 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:15 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x7a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 330.448999] overlayfs: filesystem on './file0' not supported as upperdir 05:19:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x700, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r3, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r4 = dup(0xffffffffffffffff) ioctl$KDSETLED(r4, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r2, 0x4b32, 0x0) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) accept$alg(r1, 0x0, 0x0) 05:19:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:15 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:15 executing program 3: lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) 05:19:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:15 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6000000000000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) [ 331.085895] overlayfs: filesystem on './file0' not supported as upperdir 05:19:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, &(0x7f0000000500)=0xe8) stat(&(0x7f0000000540)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r0, &(0x7f0000000740)={0x78, 0xffffffffffffffda, 0x5, {0x85ce, 0xe71, 0x0, {0x5, 0x8, 0x0, 0x0, 0x7fff, 0xffffffffffff8001, 0x3, 0x4, 0x0, 0x7ff, 0x100000001, r1, r2, 0x100000001, 0x3}}}, 0x78) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000100)) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000180)=""/227, 0xe3}, {&(0x7f0000000280)=""/176, 0xb0}, {&(0x7f0000000340)=""/50, 0x32}], 0x3, &(0x7f00000003c0)=""/86, 0x56}, 0x2040) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@rand_addr, @multicast2}, &(0x7f00000004c0)=0xc) 05:19:16 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:16 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x100000000000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) [ 331.329643] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 331.391396] FAT-fs (loop2): Filesystem has been set read-only [ 331.422949] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) [ 331.432727] overlayfs: filesystem on './file0' not supported as upperdir [ 331.482869] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) [ 331.507357] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) [ 331.525780] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) 05:19:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:16 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x2000000000000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:16 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x100000000, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000440)={0x0, 0x1f}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000004c0)={r2, 0x894c, 0x101, 0x61ab14f2, 0x7f, 0xf0e}, &(0x7f0000000500)=0x14) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000300)={0x1, {{0x2, 0x4e23, @empty}}, {{0x2, 0x4e20, @broadcast}}}, 0x108) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) accept4$unix(r3, &(0x7f0000000240)=@abs, &(0x7f00000002c0)=0x6e, 0x80000) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000100)={0x0, 0xffffffffffffd91d}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000180)={r4, 0xb4, 0x9}, 0x8) 05:19:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:16 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:16 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x5000000, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x280, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x2, 0x2) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f0000000200)=""/239) renameat(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') [ 331.697925] overlayfs: filesystem on './file0' not supported as upperdir 05:19:16 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x700) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:16 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\xff', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000180)={{0x67, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e21, 0x2, 'none\xe9\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x8a', 0x1, 0x8, 0x22}, {@multicast1, 0x4e24, 0x4, 0x1ff, 0x4, 0x7fffffff}}, 0xffffffffffffff36) [ 331.913358] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 331.973361] FAT-fs (loop2): Filesystem has been set read-only [ 332.008700] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) [ 332.043245] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) [ 332.065740] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) 05:19:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) 05:19:16 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) [ 332.089032] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) 05:19:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, 0xfffffffffffffffd, 0x80000, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000200)={0xffffffff, 0x4, 0x1}) setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:setrans_initrc_exec_t:s0\x00', 0x2b, 0x2) gettid() 05:19:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10002f, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:16 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:16 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x6800) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 332.177962] overlayfs: filesystem on './file0' not supported as upperdir 05:19:17 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2d00, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:17 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x200000000) mount$9p_rdma(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x1800000, &(0x7f00000001c0)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout'}}, {@sq={'sq', 0x3d, 0x7f}}], [{@appraise_type='appraise_type=imasig'}, {@obj_role={'obj_role'}}, {@smackfsdef={'smackfsdef', 0x3d, '/'}}]}}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)) 05:19:17 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x01', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:17 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x900, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:17 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:17 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x4) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) 05:19:17 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100018, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:17 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3b, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2(&(0x7f0000000080), 0x80000) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) 05:19:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:17 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x4800000000000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:17 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:18 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x3ff, 0x4000) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000240), &(0x7f0000000280)=0x4) munmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='NET_DM\x00') write$P9_ROPEN(r0, &(0x7f00000002c0)={0x18, 0x71, 0x2, {{0xc, 0x0, 0x2}, 0x2}}, 0x18) [ 333.115907] overlayfs: filesystem on './file0' not supported as upperdir 05:19:18 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:18 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x7a000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e20, @local}}, 0x3ff}, &(0x7f00000000c0)=0x90) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000480)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], &(0x7f00000002c0)=0x6b) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) 05:19:18 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf83f0000000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) [ 333.371415] overlayfs: filesystem on './file0' not supported as upperdir 05:19:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100041, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:18 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\xe4', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:18 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:18 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:18 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x3d8, 0x2080) connect$tipc(r0, &(0x7f0000000280)=@nameseq={0x1e, 0x1, 0x2, {0x43, 0x3}}, 0x311) mkdir(&(0x7f0000000300)='./file0\x00', 0x1fffffffc) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f0000000240)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200), 0x6, 0x2, 0x4, 0x40000000000001c8}) 05:19:18 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\xf9', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10ffe9, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:18 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:18 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x3f00000000000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:18 executing program 3: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) bind$unix(r0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) poll(&(0x7f0000000180)=[{r0, 0x9000}, {r0}, {r0}, {r0, 0x100}, {r0}, {r0, 0x8000}], 0x6, 0x7fffffff) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001800)={{{@in6=@mcast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f00000017c0)=0xdb25a9af89043823) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001580)={{{@in6=@ipv4={[], [], @empty}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000001680)=0xe8) syz_mount_image$btrfs(&(0x7f00000001c0)='btrfs\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x3, &(0x7f00000013c0)=[{&(0x7f0000000240)="68e9857265df35a1e17a92fd9f955e4a47eaf9be7400837c02d78c1e2a704620403a35e6e2d57e1ad76f12e2267af731c9ac4ee9c29284a39fecc9db44b26eda0897d3caa14993b2ff82b372f9df474cca8b2598dc2b371be37152d50ea83b12f0abd0e5188a2ef3a9db4bad4689682ab56d57fefea1e3932e35110e47d0fb9a72f1343ef56d7bd483519706bbfbe0688493238523595b470c1a88bc76e798529c19bda4be03f5", 0xa7, 0x5}, {&(0x7f0000000300)="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", 0x1000, 0x7}, {&(0x7f0000001300)="a59715fd7c4757ffc3eda031352af87a2c47f37779dc4f0d5d66307483a050fbcc9cfc3b59451364838399bc69bdd2c0a2d073cc1184aea8ba6d511945a26cd015538bb0a7092b267580d79c347be682a8e96f9a4c5ec922ef2d1291b4b02f0ca1f6ec11a783268e4444ee0fe4a17e71d2e1803c9188a0da3ec4e2a54e342f30d2e1ce05e62c290aeafb4b025f6adf6419a0f727b5b230f43691bcec25c9d36d928073c842b851986c9521d7517fb587731656", 0xb3, 0x1f}], 0x1000000, &(0x7f0000001440)=ANY=[@ANYBLOB='noacl,skip_balance,check_int_data,rescan_uuid_tree,nospace_cache,fsname=trusted@.cpuset(eth0mime_type\\,fowner=', @ANYRESDEC=r1, @ANYBLOB="2c657569643da23b5b7e", @ANYRESDEC=r2, @ANYBLOB=',\x00']) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) setxattr(&(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)=@known='trusted.overlay.origin\x00', &(0x7f0000001740)='btrfs\x00', 0x6, 0x1) renameat(r0, &(0x7f0000001500)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001540)='./file1\x00') 05:19:18 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6800, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:18 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x500) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:19 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\n', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:19 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3f00, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10ffea, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:19 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x10', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:19 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x8000000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:19 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xc000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x101020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:19 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) fcntl$setpipe(r0, 0x407, 0xfe0000000) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000000200)={'team0\x00', 0xcd1, 0xffff}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)) 05:19:20 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x1100) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:20 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlayG', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:20 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x20000, 0x0) 05:19:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10000a, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:20 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x68) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x220000, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000180)=""/4096) 05:19:20 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:20 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10002d, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x8000, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) [ 336.074353] overlayfs: filesystem on './file0' not supported as upperdir 05:19:20 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:21 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000ea, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:21 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x74) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:21 executing program 3: statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)=""/4096) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)) [ 336.358795] EXT4-fs: 5 callbacks suppressed [ 336.358806] EXT4-fs (sda1): Cannot specify journal on remount [ 336.408178] overlayfs: filesystem on './file0' not supported as upperdir [ 336.548974] EXT4-fs (sda1): Cannot specify journal on remount 05:19:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:21 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:21 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) 05:19:21 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x10', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:21 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x400000000000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100025, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:21 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x7a00000000000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:21 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7400, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:21 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x400, 0x1a10c2) r1 = fcntl$getown(0xffffffffffffffff, 0x9) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x8, 0x4, 0xfffffffffffff9b9, 0xfff, 0x80, r1}) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000140)) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000000)={{0x5, 0x7, 0xff, 0x80, 0xffffffffffff8000, 0x51}, 0x100000000}) getpid() ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f0000000180)={0x6, 0xffffffff, 0x2, 0xfffffffffffffffd, 0x1, 0x1}) 05:19:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100060, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:22 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:22 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xc0000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) [ 337.356449] EXT4-fs (sda1): Cannot specify journal on remount [ 337.367652] overlayfs: filesystem on './file0' not supported as upperdir 05:19:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') dup(0xffffffffffffffff) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000e9, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:19:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 05:19:22 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x4c000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:22 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:22 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 05:19:22 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4800, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) [ 337.964410] overlayfs: filesystem on './file0' not supported as upperdir 05:19:22 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x3f00) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:22 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\a', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:22 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x68, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='\nournal_path=.']) [ 338.308882] EXT4-fs (sda1): Unrecognized mount option " [ 338.308882] ournal_path=." or missing value [ 338.454649] EXT4-fs (sda1): Unrecognized mount option " [ 338.454649] ournal_path=." or missing value 05:19:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:23 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xc0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x60000000, 0x2, &(0x7f0000000300)=[{&(0x7f0000000180)="04942bba1258ec4f76891e22ff230f69305148826dbf430abba1dfd88525b5a9bb61db5220c4594455d5fe94af596a38c29878fcd677f81e3323d1ce83da25e74f7f754e162f671ee51d4b096d20e57ffc45659770c9c07b02668a138bf2eb1b699cd20d18786eded5adff12fbccb83e978dd9e6876ca329fc54ab19a0865d3dd8e53ae758c8475fa66fc89165b84955ea62c16616847a8b7ab6e02cff6fdd71292d", 0xa2, 0x200}, {&(0x7f0000000240)="4bdbffc79786b9a281fc81d2d6c69690744799eeabfb264fec9a6120c1b68035e819c377f1ef6a87d815a435d57c62791304e8e0ef130909a35cccecf0b09764db6efcfe1e08a600614f02963f79ab0a21f00ac879553b3ab47cd13e58fa45f559ed12850d622a89c43036f5ddf3ca011902838ed48a1e13a98caacd2db1840ff93a", 0x82, 0x40}], 0x186040, &(0x7f0000000340)={[{@uid={'uid', 0x3d, r0}}, {@case_sensitive_no='case_sensitive=no'}, {@utf8='utf8'}, {@errors_recover='errors=recover'}, {@case_sensitive_yes='case_sensitive=yes'}, {@dmask={'dmask', 0x3d, 0x519}}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r0}}, {@errors_continue='errors=continue'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@hash='hash'}, {@euid_lt={'euid<', r0}}]}) 05:19:23 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\xff', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:23 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x6c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='%ournal_path=.']) 05:19:23 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) [ 338.936446] EXT4-fs (sda1): Unrecognized mount option "%ournal_path=." or missing value 05:19:23 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:23 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0xffff8000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 339.144587] EXT4-fs (sda1): Unrecognized mount option "%ournal_path=." or missing value 05:19:24 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x1e) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x6, 0x80) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r0, &(0x7f0000000080)="6be51246daacf11bb1763891ba221dbd02ae6f8f2955103efbbb538e9b5289de3adaf6d4f4ad00daaa135518c0ae4a71cd25bdb78c0219f7660c8e35052da011e54b43", &(0x7f00000001c0)=""/108}, 0x18) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2000, 0x0) 05:19:24 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='j%urnal_path=.']) [ 339.228459] overlayfs: filesystem on './file0' not supported as upperdir [ 339.476979] EXT4-fs (sda1): Unrecognized mount option "j%urnal_path=." or missing value [ 339.670282] EXT4-fs (sda1): Unrecognized mount option "j%urnal_path=." or missing value 05:19:24 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:24 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x68000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:24 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xa000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:24 executing program 3: setxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'U+', 0x5}, 0x28, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) 05:19:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='j\nurnal_path=.']) 05:19:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x4000, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000700)={0x0, @bt={0x0, 0x8001, 0x0, 0x0, 0xdc34, 0xfffffffffffeffff, 0x4, 0x9, 0x1ff, 0x5, 0x6, 0x9, 0x9, 0xffffffff, 0x8, 0x2}}) recvmmsg(r0, &(0x7f0000000680)=[{{&(0x7f00000001c0)=@x25={0x9, @remote}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000240)=""/95, 0x5f}], 0x1, &(0x7f0000000300)=""/12, 0xc}, 0x800}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000340)=""/230, 0xe6}, {&(0x7f0000000440)=""/140, 0x8c}, {&(0x7f0000000500)=""/237, 0xed}], 0x3, &(0x7f0000000640)=""/12, 0xc}, 0x9}], 0x2, 0x2, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/capi/capi20\x00', 0x10000, 0x0) [ 339.958139] overlayfs: filesystem on './file0' not supported as upperdir 05:19:24 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay|', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:24 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffff5, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) [ 340.019032] EXT4-fs (sda1): Unrecognized mount option "j [ 340.019032] urnal_path=." or missing value 05:19:24 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x3f000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:25 executing program 3: mkdir(&(0x7f00000002c0)='./file0\x00', 0x10) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x10000, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f00000000c0)={0x2406d084, 0x3f2}) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) syz_open_procfs$namespace(r1, &(0x7f0000000340)='ns/net\x00') lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) stat(&(0x7f0000000300)='./file0\x00', &(0x7f00000001c0)) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000380)=0xffff, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) ioprio_get$pid(0x3, r2) rmdir(&(0x7f0000000000)='./file0\x00') 05:19:25 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='jo.rnal_path=.']) 05:19:25 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\xff', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:25 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xc000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/exec\x00', 0x2, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x10000, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000280)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f00000002c0)=0x10) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x4800) write$P9_RREAD(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="b7000000750100ac000000e1982fc5329e72fd1a99e29a1dffc42d1f8fc936512fe1ab79bc576bac663d8f83408fcce836a04c0decea7bc4e9ff7f6b3015e84b06175fc4a23da69a6e4163dbc2462be3555afae47a20f12b4d6fe3dd77d6ff8e8d614f5905a442096bbde32cf7fbfc9ede0407f185ba0af56fecdd0051e3b69c49a7292f9c385fe1dd93c16528d8ce8bc920e7fc0793489f7ee9755d0baf502b364e259d2e493ed828c3cd58c431d68650b88399d43f9c"], 0xb7) r3 = dup(r0) dup3(r3, r1, 0x80000) 05:19:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='jocrnal_path=.']) 05:19:25 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x6c000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:25 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:25 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:25 executing program 3: rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') mkdir(&(0x7f0000000040)='./file1\x00', 0x0) lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x0, 0x2710}}) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xffff, 0x8000) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000300)={@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-cast6-avx\x00'}, {&(0x7f0000000100)=""/85, 0x55}, &(0x7f00000003c0)}, 0xa0) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPIN\x00', &(0x7f0000000180)='{\x00', 0x2, 0x2) 05:19:25 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf5ffffff, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) [ 340.928683] overlayfs: filesystem on './file0' not supported as upperdir 05:19:25 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$media(&(0x7f0000000500)='/dev/media#\x00', 0x7fff, 0x80) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000540)=0x100000000) read$FUSE(r0, &(0x7f00000006c0), 0x1000) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="800000006e6f3d", @ANYRESHEX=r0, @ANYBLOB=',cache=mmap,access=any,fsuuid=\x00\x007b9Ic}-\x009g}-ca1w-721c-8u~70a5e,subj_type=/dev/media#\x00,hash,\x00']) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000100)="28d385d333f1783ac6f9f87cb7ad434b3ff5e5817d199f4e2dcd5619b92fa6f9e3970289cfe5175380dd01a5d9f1a8b03f40d1922d85e8968ae2d54ae8a8b298f5ec22123e1ba2fe1a6df841214e4804f196c2a73af1f85c266869880e3fb07211fd55d7d524328f5c40", 0x6a, 0x1ff}, {&(0x7f0000000200)="b5c3bbccee1bac5b2e6fb442555aeda4fc6ec607fc662e58cb011bf5daed5eedae346aea548c2073685119a62d338da1c8621b02001507c8804d1437d06b62335234bea39ec19a4906c0854d33b4cf757742556c39ec976a5284d577", 0x5c, 0x8}, {&(0x7f0000000280)="68a45994ee5c7c2a42afb0f4efd9f0c69d2f0cd788e00d8a3f1689a988ad95459da1193c038ac0eb4c02b25de5ebdba8ea35154c2627b9aafce55224da181bd36f62b02305a7cce3e49271dd242ec05541631c859187ef407f5e7d7c6c412547b46b1f4e35f675e431e92ac497ebd8172f873bf42fe9cb61642e69dfadfe01632011540981a16b01c2f96c65db3f6a83ed8e86c88a25700c9632a92124946f0dca6ba26e81d6ef1c0dcff27b6dc21f4d3377465c81516058cd2106ecc89cdc8d95024519c8ea1f2dca01f424d340928c9f8bf359de9f895d6d2b3a16b33ad5988babd17e8d1007d8498c897d2e1ab2ff3397cb2a32b2", 0xf6, 0x7}], 0x80000, &(0x7f0000000400)=ANY=[@ANYBLOB="636f6e762c6e6f757365725f78617474722c6a6465763d2e2f66696c65312c726573697a653d3078303030303030303030303030303030d0d13a059ee394a23d3078303030303030303030303030303030362c7461696c733d6f6e2c646174613d6a6f75726e616c2c686173683d72352c61636c6c6a71666d743d7666736f6c642c666f776e65723e", @ANYRESDEC=r1, @ANYBLOB=',dont_hash,rootcontext=unconfined_u,obj_type=-,obj_type=:ppp0eth0eth1\\vmnet1cpuset,\x00']) 05:19:25 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x2000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:25 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x300, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) [ 341.122472] 9pnet: Insufficient options for proto=fd [ 341.199830] overlayfs: filesystem on './file0' not supported as upperdir [ 341.258938] 9pnet: Insufficient options for proto=fd 05:19:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x48, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:26 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:26 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='josrnal_path=.']) 05:19:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:26 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:26 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6c, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) [ 341.866120] overlayfs: filesystem on './file0' not supported as upperdir [ 341.890612] EXT4-fs: 4 callbacks suppressed [ 341.890623] EXT4-fs (sda1): Unrecognized mount option "josrnal_path=." or missing value 05:19:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x102) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"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"}) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200200, 0x0) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000080)) remap_file_pages(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000000, 0x6, 0x20) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000480)={0x7b}) r4 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r4, 0xc0305616, &(0x7f0000000100)={0x0, {0x2, 0x8}}) 05:19:26 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x1100000000000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 342.025263] EXT4-fs (sda1): Unrecognized mount option "josrnal_path=." or missing value 05:19:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x74000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='jo\nrnal_path=.']) [ 342.144521] overlayfs: filesystem on './file0' not supported as upperdir 05:19:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x40000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:27 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x1000000000000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:27 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 342.296008] EXT4-fs (sda1): Unrecognized mount option "jo [ 342.296008] rnal_path=." or missing value 05:19:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xa00, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) [ 342.432461] EXT4-fs (sda1): Unrecognized mount option "jo [ 342.432461] rnal_path=." or missing value [ 342.506704] overlayfs: filesystem on './file0' not supported as upperdir 05:19:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='joXrnal_path=.']) 05:19:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf5ffffff00000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:27 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x3000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:27 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:27 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x800000000003, 0x0, &(0x7f0000000180)) sigaltstack(&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000080)) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x100000000, 0x200) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SG_IO(r0, 0x2285, &(0x7f00000001c0)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x400da, 0x0}, &(0x7f0000000300)="5f39203a3e15", 0x0, 0x0, 0x0, 0x0, 0x0}) [ 342.755417] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) [ 342.762561] FAT-fs (loop2): Filesystem has been set read-only 05:19:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:27 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) personality(0x500000b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) sysfs$1(0x1, &(0x7f0000000100)='memory.events\x00') write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="00f06d656d6f72790e"], 0x200600) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$VIDIOC_S_OUTPUT(r0, 0xc004562f, &(0x7f0000000000)=0x7) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) 05:19:27 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 342.834625] overlayfs: filesystem on './file0' not supported as upperdir [ 342.861338] EXT4-fs (sda1): Unrecognized mount option "joXrnal_path=." or missing value 05:19:27 executing program 3: ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0xffffffffffffffff, 0xfffffffffffffffe) r1 = fcntl$getown(r0, 0x9) ptrace$pokeuser(0x6, r1, 0x7fffffff, 0xfffffffffffffffb) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x20000, 0x0) remap_file_pages(&(0x7f0000fef000/0x3000)=nil, 0x3000, 0x1000002, 0x74f, 0xffc) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x4) rmdir(&(0x7f0000000580)='./bus\x00') write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f00000000c0)=""/12) mkdir(&(0x7f0000000680)='./bus\x00', 0x22) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, &(0x7f0000000fc0)="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") syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x411db068, 0x20000) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3, 0x1}, 0x20) 05:19:27 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x48000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 342.994139] EXT4-fs (sda1): Unrecognized mount option "joXrnal_path=." or missing value 05:19:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) [ 343.051338] overlayfs: filesystem on './file0' not supported as upperdir 05:19:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='joirnal_path=.']) 05:19:28 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:28 executing program 3: ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0xffffffffffffffff, 0xfffffffffffffffe) r1 = fcntl$getown(r0, 0x9) ptrace$pokeuser(0x6, r1, 0x7fffffff, 0xfffffffffffffffb) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x20000, 0x0) remap_file_pages(&(0x7f0000fef000/0x3000)=nil, 0x3000, 0x1000002, 0x74f, 0xffc) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x4) rmdir(&(0x7f0000000580)='./bus\x00') write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f00000000c0)=""/12) mkdir(&(0x7f0000000680)='./bus\x00', 0x22) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, &(0x7f0000000fc0)="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") syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x411db068, 0x20000) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x0, 0x3, 0x1}, 0x20) 05:19:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) [ 343.324731] EXT4-fs (sda1): Unrecognized mount option "joirnal_path=." or missing value [ 343.379019] overlayfs: filesystem on './file0' not supported as upperdir [ 343.514394] EXT4-fs (sda1): Unrecognized mount option "joirnal_path=." or missing value 05:19:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:28 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x7400) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:28 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f00000000c0)=0x5, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) 05:19:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:28 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x05', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='jo#rnal_path=.']) 05:19:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x100000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) [ 343.807533] EXT4-fs (sda1): Unrecognized mount option "jo#rnal_path=." or missing value 05:19:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x1, 0x2) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="0e6d09f18d48ec27ef00046b4dd4"], 0x1c}}, 0x0) 05:19:28 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\r', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:28 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 343.952368] EXT4-fs (sda1): Unrecognized mount option "jo#rnal_path=." or missing value 05:19:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:28 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x208000, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000100), &(0x7f00000000c0)=0x4) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x7d}) 05:19:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='joprnal_path=.']) 05:19:28 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\a', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:29 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x11) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:29 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0x1c0323}) setsockopt$inet_dccp_int(r0, 0x21, 0xb, &(0x7f0000000000)=0x100000000, 0x4) 05:19:29 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:29 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x06', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='joornal_path=.']) 05:19:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:29 executing program 3: r0 = socket(0x200000000010, 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') write(r0, &(0x7f0000000200)="240000002a007f002000000000ed7601000000ff01000000000000efff0100ff10000b00", 0x24) 05:19:29 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6c00, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:29 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x2000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:29 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay:', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:29 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:29 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000080)={0x1, 0x0, {0x2, 0x0, 0x0, 0x3, 0x7fff}}) ioctl(r0, 0x5, 0x0) 05:19:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='jo-rnal_path=.']) 05:19:29 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x6000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:29 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@remote}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@dev}, 0x14) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000340)='trusted.overlay.nlink\x00', &(0x7f0000000380)={'L+', 0x101}, 0x28, 0x1) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) execveat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=[&(0x7f00000000c0)='\x00', &(0x7f0000000140)='\'\x00', &(0x7f0000000180)='wlan0\x00'], &(0x7f0000000280)=[&(0x7f0000000240)='$\x00'], 0x1000) syz_emit_ethernet(0x3e, &(0x7f0000001180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd60b7e72000085500fe8000000000000000000000000000aafe8003000000000000000000000000aa8000907800000000"], &(0x7f0000000000)) removexattr(&(0x7f00000003c0)='\x00', &(0x7f0000000400)=@random={'osx.', '\x00'}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f00000002c0)={'mangle\x00', 0x3, [{}, {}, {}]}, 0x58) 05:19:29 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x3, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:29 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(0xffffffffffffffff, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r2 = dup(0xffffffffffffffff) ioctl$KDSETLED(r2, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) [ 344.991224] overlayfs: filesystem on './file0' not supported as upperdir 05:19:29 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='/dev/loop#\x00', 0x7) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fsync(r3) ioctl$sock_proto_private(r2, 0x89e2, &(0x7f0000000040)) r4 = dup2(r0, r2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r4, &(0x7f0000000240)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x100000000, @ipv4={[], [], @rand_addr=0x1}, 0x9}, r5}}, 0x30) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f0000000100), &(0x7f0000000180)=0x30) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x204000000000001c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc8fb47081025bad6b39d7780666157a96aae15813f0dceb29700", "a8a4cd01e527e6fd3de45387daf7b1ac786d0e8a75e89046550fa2d2d25b60361fe06f308fe6033a61edb75c8d51c055faf7f4fd03000000a4276939a3410334", "7b8ddcc0c89159fed06d00f97c955b4ab8a700", [0xfffffffffffffffc]}) 05:19:29 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x03', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:29 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:30 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x10000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='jodrnal_path=.']) 05:19:30 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:30 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\xf6', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:30 executing program 3: syz_open_dev$vcsa(&(0x7f0000000380)='/dev/vcsa#\x00', 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f000000a000)) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(0xffffffffffffffff, 0xc040564a, 0x0) fstat(0xffffffffffffffff, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000000)) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f00000002c0)={0x0, 0x9}) [ 345.435026] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 05:19:30 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:30 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x4c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 345.632963] rpcbind: RPC call returned error 22 05:19:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='jolrnal_path=.']) 05:19:30 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x14', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 345.660890] rpcbind: RPC call returned error 22 05:19:30 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x5) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x40000, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0)=ANY=[@ANYBLOB="3a521215767a50b11b000000000000455b893da1c722d2dcdaf7430b"], &(0x7f00000000c0)=0x4) setsockopt$ax25_int(r0, 0x101, 0x4, &(0x7f0000000000)=0x1f, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000140)='security.evm\x00', &(0x7f0000000180)=@ng={0x4, 0x2, "d198b79f7a2a981a53c526bd6f"}, 0xf, 0x1) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000040)=0x100000, 0x4) pipe2(&(0x7f0000000080), 0x80800) 05:19:30 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6000000000000000, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='jo+rnal_path=.']) 05:19:30 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x300000000000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:30 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x1c', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:30 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x5) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x40000, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0)=ANY=[@ANYBLOB="3a521215767a50b11b000000000000455b893da1c722d2dcdaf7430b"], &(0x7f00000000c0)=0x4) setsockopt$ax25_int(r0, 0x101, 0x4, &(0x7f0000000000)=0x1f, 0x4) fsetxattr$security_evm(r1, &(0x7f0000000140)='security.evm\x00', &(0x7f0000000180)=@ng={0x4, 0x2, "d198b79f7a2a981a53c526bd6f"}, 0xf, 0x1) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000040)=0x100000, 0x4) pipe2(&(0x7f0000000080), 0x80800) 05:19:30 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100060, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:31 executing program 3: r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) openat$cgroup_ro(r0, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) io_setup(0x3f, &(0x7f0000000100)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x3, 0xfffffffffffffffd, 0x3bab8dee}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0xffffffff, 0x7fffffff}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000180)={{0x2, 0x4e21, @rand_addr=0xffffffff00000000}, {0x307, @remote}, 0x8, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2a}}, 'vcan0\x00'}) ftruncate(r0, 0x8) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000040)={'veth1\x00', {0x2, 0x4e23, @loopback}}) 05:19:31 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:31 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x6800000000000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 346.346672] overlayfs: filesystem on './file0' not supported as upperdir 05:19:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='joxrnal_path=.']) 05:19:31 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10002f, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:31 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 346.674407] overlayfs: filesystem on './file0' not supported as upperdir 05:19:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:31 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x7400000000000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:31 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:31 executing program 3: ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x40247007, 0x0) sched_setaffinity(0x0, 0xfffffffffffffd2e, &(0x7f00000001c0)=0x57d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2902001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000140), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0xfffffffffffffee6) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x305102, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) r1 = getpid() r2 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0xfffffffffffffffc, 0x280001) rt_tgsigqueueinfo(r1, r1, 0x4, &(0x7f0000000300)={0x0, 0x0, 0x100}) r3 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff9, 0x20880) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000380)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f00000003c0)=0x14) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000400)={r4, 0xf, "43882c14a02801aab568a968f4ccab"}, &(0x7f0000000440)=0x17) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000080)={0x1, 0x10001, 0xfff, 0x7fffffff, 0x15, 0x2, 0xe0, 0x8, 0x28ce, 0x100000001, 0x1, 0xdbdb}) syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x8040) ptrace(0x10, r1) ptrace$pokeuser(0x6, r1, 0x200390, 0xffffffffffffffff) creat(&(0x7f0000000200)='./file0\x00', 0x162) ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000240)={0x0, "333b26f565c160b3682efea0bec29759edc788747af98d5d9e0cb96158c2f424", 0x3, 0x1, 0x7, 0x0, 0x4000000}) open(&(0x7f0000000100)='./file0\x00', 0x101000, 0xc0) 05:19:31 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='jo*rnal_path=.']) [ 346.829565] overlayfs: filesystem on './file0' not supported as upperdir 05:19:31 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10003b, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:31 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x700000000000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 347.038156] audit: type=1804 audit(1546406371.828:60): pid=15869 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir657686215/syzkaller.CgR7vA/347/file0" dev="sda1" ino=16582 res=1 [ 347.077688] EXT4-fs: 15 callbacks suppressed [ 347.077699] EXT4-fs (sda1): Unrecognized mount option "jo*rnal_path=." or missing value 05:19:31 executing program 3: sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="6a98eb8c"], 0x1}}, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xfffffffffffeffe6, &(0x7f0000000380)="5fe86f57a76da0bbfa698a978fb2ad03000000ac867cc25cb68c8bd2c7aa694ba6c74f0f5150b4abf277ffd0d36c3412f3e4e7cb4f3a7076fee5560d20655493d34acf8945fc259ae05d6a4e19000000000000") r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x4, 0x8000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0xec, r2, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7f}]}, @TIPC_NLA_LINK={0x98, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x1}, 0x4) [ 347.152101] overlayfs: filesystem on './file0' not supported as upperdir [ 347.203312] audit: type=1804 audit(1546406371.958:61): pid=15890 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir657686215/syzkaller.CgR7vA/347/file0" dev="sda1" ino=16582 res=1 05:19:32 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:32 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x4c00000000000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='jo0rnal_path=.']) [ 347.523182] EXT4-fs (sda1): Unrecognized mount option "jo0rnal_path=." or missing value [ 347.558147] overlayfs: filesystem on './file0' not supported as upperdir 05:19:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:32 executing program 3: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000100)={{}, [@remote, @default, @null, @default, @null, @netrom, @default, @default]}, &(0x7f0000000180)=0x48, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x200000, 0x0) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0xa0000, 0x0) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f0000000240)={r3, r4, 0x9}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7d, 0x4498, 0x100000002, 0x0, 0xffffffffffffffff, 0x0, [0x5f]}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r5, &(0x7f0000000080), &(0x7f0000000380)}, 0x20) 05:19:32 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\xf0', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:32 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10002d, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:32 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x6000000000000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 347.669486] EXT4-fs (sda1): Unrecognized mount option "jo0rnal_path=." or missing value 05:19:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='jo%rnal_path=.']) 05:19:32 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:32 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x12', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:32 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x101020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:32 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x4800) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 347.943914] EXT4-fs (sda1): Unrecognized mount option "jo%rnal_path=." or missing value 05:19:32 executing program 3: r0 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) io_setup(0x80000001, &(0x7f0000000400)=0x0) getpeername$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000380)=0x1c) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000, 0x407000}]) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000180)={0x0, 0x44, "bae247a2a874aec2a01b3a6b91d47f8d6a9d10373736e490a93ecd86101d3896fa45cf475aa230e633b6af0b31868253ad11cb44aa82c7b3b7172c74f0c3b3849c314b52"}, &(0x7f0000000200)=0x4c) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000002c0)=@assoc_value={r2, 0x4}, 0x8) socket$alg(0x26, 0x5, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000140)=0x4) fstat(r3, &(0x7f0000000240)) truncate(&(0x7f0000000340)='./bus\x00', 0x400002) 05:19:32 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 348.112749] overlayfs: filesystem on './file0' not supported as upperdir [ 348.132694] EXT4-fs (sda1): Unrecognized mount option "jo%rnal_path=." or missing value 05:19:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r2 = dup(0xffffffffffffffff) ioctl$KDSETLED(r2, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:33 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='jou%nal_path=.']) 05:19:33 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001780)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="28000000210000002900000002000000040000000000000000000000000000010000000000000000"], 0x28}, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x8000, 0x54402) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0xa00, 0x0) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f00000000c0)={0x2, 0x1, 0x5ca1}) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000140), 0x4) unshare(0x10100) 05:19:33 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10000a, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) 05:19:33 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x2, 0x3, 0x0, 0x0, 0xb, 0x0, 0x70bd2d, 0x0, [@sadb_spirange={0x0, 0x10, 0x4d4, 0x4d3}]}, 0x29}}, 0x200000c0) [ 348.749141] EXT4-fs (sda1): Unrecognized mount option "jou%nal_path=." or missing value [ 348.783116] overlayfs: filesystem on './file0' not supported as upperdir 05:19:33 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x6) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100025, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}], [], 0x1000000}) [ 348.894656] EXT4-fs (sda1): Unrecognized mount option "jou%nal_path=." or missing value 05:19:33 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='jou\nnal_path=.']) 05:19:33 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000200)=0x9) close(r0) [ 349.106319] overlayfs: filesystem on './file0' not supported as upperdir [ 349.277184] EXT4-fs (sda1): Unrecognized mount option "jou [ 349.277184] nal_path=." or missing value [ 349.451376] EXT4-fs (sda1): Unrecognized mount option "jou [ 349.451376] nal_path=." or missing value 05:19:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='jour\nal_path=.']) 05:19:34 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x74000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'Xebug_want_extra_isize'}}], [], 0x1000000}) 05:19:34 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\xff', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x7) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) sendmmsg(r2, &(0x7f0000005b40), 0x40000000000014d, 0x0) recvfrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) [ 349.706558] EXT4-fs (sda1): Unrecognized mount option "Xebug_want_extra_isize=0x0000000000000000" or missing value 05:19:34 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:34 executing program 3: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) rt_sigsuspend(&(0x7f0000000040), 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) sched_rr_get_interval(r0, &(0x7f0000000000)) tkill(r0, 0x1000000000016) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x638, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0x810c5701, &(0x7f0000000100)={0x1, 0x0, 0x1, 0x0, [0xfffffffe, 0xfdfdffff]}) 05:19:34 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x1000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 349.874630] overlayfs: filesystem on './file0' not supported as upperdir 05:19:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='jour%al_path=.']) 05:19:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'sebug_want_extra_isize'}}], [], 0x1000000}) 05:19:34 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 350.173907] overlayfs: filesystem on './file0' not supported as upperdir 05:19:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journ\nl_path=.']) 05:19:35 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x300) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:35 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x101000, 0x0) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000100)=0xfffffffffffff1f1) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa, 0xe}}) 05:19:35 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay&', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'iebug_want_extra_isize'}}], [], 0x1000000}) 05:19:35 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x6, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$inet_mreqsrc(r1, 0x10d, 0x2, &(0x7f0000013ff4)={@remote, @loopback}, 0xc) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x181002, 0x0) ioctl$KVM_SET_XCRS(r3, 0x4188aea7, &(0x7f0000000040)={0x7, 0x2, [{0x3, 0x0, 0x322d}, {0x6833, 0x0, 0x4}, {0x0, 0x0, 0xff}, {0xffffffffffffff80, 0x0, 0x1}, {0x1000, 0x0, 0x3}, {0x0, 0x0, 0x7fffffff}, {0x8001, 0x0, 0x4040000000000}]}) close(r1) socket$inet6(0xa, 0x1000000000002, 0x0) dup3(r1, r2, 0x0) 05:19:35 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay ', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:35 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x6c00) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f000000f000/0x4000)=nil, 0x4000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth0\x00', &(0x7f00000003c0)=@ethtool_coalesce={0x3b, 0x2, 0xff0f0000, 0x80000}}) close(r2) close(r1) 05:19:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journ%l_path=.']) 05:19:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'xebug_want_extra_isize'}}], [], 0x1000000}) 05:19:36 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x5000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:36 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:36 executing program 3: socket$inet6(0xa, 0x2, 0x0) r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x44) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r1, &(0x7f0000000340)={0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xec\xff\xff\xff\xff\xff\xff\xff\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000480)=""/195, 0xc3}, 0x4d6) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$tipc(0x1e, 0x5, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000040)) openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040), 0x21c}], 0x8) 05:19:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journa+_path=.']) 05:19:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'\nebug_want_extra_isize'}}], [], 0x1000000}) [ 351.523128] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 351.550643] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 351.554235] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 351.566586] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 351.574092] overlayfs: filesystem on './file0' not supported as upperdir [ 351.581243] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 351.589836] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 351.597148] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 351.611131] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 05:19:36 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 351.623014] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 351.636924] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 351.657062] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 351.661108] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 351.669757] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 351.681301] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 351.683107] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 351.692463] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 351.702433] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 351.707379] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 351.716672] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 351.717161] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 351.723921] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 351.736271] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 351.744201] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 351.747051] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 351.775978] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 351.790969] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 351.795981] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 351.806268] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 351.826618] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 351.845825] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 351.849829] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 05:19:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'-ebug_want_extra_isize'}}], [], 0x1000000}) [ 351.878300] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 351.890502] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 351.899837] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 351.922211] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 351.928930] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 351.928951] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 351.928970] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 351.928989] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 351.929008] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 351.929027] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 351.929046] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 05:19:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journa0_path=.']) [ 351.929063] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 351.929082] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 351.929100] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 351.929118] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 351.929135] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 351.929154] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 351.957463] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.047024] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.054744] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.067344] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.069474] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.082884] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.090141] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.097346] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.104530] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.105397] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.111364] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.125755] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.132611] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.140192] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.147378] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.154514] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.161356] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.165774] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.168497] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.187137] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.195161] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.202019] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.209198] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.209871] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.217903] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.229810] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.236969] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.245059] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.246909] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.251908] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.270466] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.278645] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.290436] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.298742] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.300584] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.310389] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.312216] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.312235] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.312252] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.321389] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.352480] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.359708] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.372835] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.380102] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.390153] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.392933] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.411673] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.415008] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.418812] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.438232] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.446449] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.451067] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.453264] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.473027] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.473497] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.480176] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.490565] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.500167] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.500847] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.506968] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.506996] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.520431] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.527151] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.527227] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 05:19:37 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r2 = dup(0xffffffffffffffff) ioctl$KDSETLED(r2, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r0, 0x4b32, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) [ 352.534426] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.540681] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.553022] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.554439] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.561053] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.567668] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.567744] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.582681] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.587838] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.597893] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.601510] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.613720] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.614682] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.621358] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.627958] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.627977] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.627996] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.628015] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.641395] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.648112] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.648130] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.660584] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.661500] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.670097] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.674946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.674965] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.674985] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.675002] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.687311] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.688400] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.701017] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.701694] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.708807] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.715871] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.715890] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.715909] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.715928] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.715945] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.715963] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.715982] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716001] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716020] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716037] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716072] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716090] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716108] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716126] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716145] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716163] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716181] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716198] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716216] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716232] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716251] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716269] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716286] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716322] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716340] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716366] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716384] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716402] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716420] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716438] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716455] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716474] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716492] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716510] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716528] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716546] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716564] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716583] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716601] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716628] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716646] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716664] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716682] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716701] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716719] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716737] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716763] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716782] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716800] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716818] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716837] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716855] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716873] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716891] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716910] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716927] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716964] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.716981] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.717000] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.717017] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.717035] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.717053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.717070] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.717089] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.717107] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.717125] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.717144] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.717161] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.717178] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.717196] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.717214] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.717232] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.717251] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.717269] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.717287] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.717306] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.717324] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.717342] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.717366] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.717384] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.717402] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.717420] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.717438] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.717457] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.717475] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.717492] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.717513] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.717532] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.717549] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.717566] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.732952] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.737683] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.737704] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.750073] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.751347] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.758332] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.764895] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.764914] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.764932] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.764949] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.777205] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.779598] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.791784] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.798494] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.805325] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.811848] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.824026] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.825272] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.831812] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.831834] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.838628] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.850797] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.852060] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 05:19:38 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 352.858931] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.866643] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.877598] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.878977] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.886341] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.892273] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.904343] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.905679] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.912220] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.912239] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.912257] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.919053] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.931242] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.932508] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.939396] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.945953] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.957828] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.960548] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.966763] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.972800] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.984974] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.986218] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 352.992761] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.992780] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.992798] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 352.999601] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 353.011877] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.013029] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 353.019919] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.026464] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 353.038400] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.041096] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 353.049833] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.053230] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 353.065420] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.066655] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 353.073201] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.073220] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.073239] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.080043] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 353.092397] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.093494] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 353.100310] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.106850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 353.118902] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.120296] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 353.127581] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.146106] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.155095] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.187680] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.200287] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.211528] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.229381] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.238549] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz1 [ 353.250953] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.278283] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.293091] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.337530] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.350049] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.363121] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.397600] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.412762] overlayfs: filesystem on './file0' not supported as upperdir [ 353.451641] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.483952] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.498209] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.524909] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.524932] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.565346] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.580478] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.605499] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.638985] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.639005] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.639024] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.639043] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.652637] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.679324] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.679345] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.693417] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.707211] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.746746] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 353.760840] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.096309] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.103012] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.109761] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.116502] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.123614] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.130342] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.137063] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.143964] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.150747] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.157809] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.164598] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.171379] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.178167] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.184946] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.191718] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.198493] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.205268] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.212048] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.219102] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.225907] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.232677] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.239471] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.246348] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.253064] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.259791] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.266484] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.273145] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.279853] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.286566] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.293235] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.299953] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.306656] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.313316] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.320028] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.326747] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.333466] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.340143] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.346863] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.353584] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.360273] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.366987] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.373711] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.380468] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.387186] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.393941] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.400637] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 05:19:39 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x80ffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 354.407353] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.414081] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.420750] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.427459] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 354.435167] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz0] on syz1 05:19:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) [ 354.490750] EXT4-fs: 13 callbacks suppressed [ 354.490763] EXT4-fs (sda1): Unrecognized mount option "journa0_path=." or missing value [ 354.584026] EXT4-fs (sda1): Unrecognized mount option "-ebug_want_extra_isize=0x0000000000000000" or missing value 05:19:39 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 354.637817] overlayfs: filesystem on './file0' not supported as upperdir 05:19:39 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x6c00000000000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 354.771608] EXT4-fs (sda1): Unrecognized mount option "journa0_path=." or missing value 05:19:39 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'uebug_want_extra_isize'}}], [], 0x1000000}) 05:19:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journa|_path=.']) [ 354.968636] overlayfs: filesystem on './file0' not supported as upperdir [ 355.066711] EXT4-fs (sda1): Unrecognized mount option "journa|_path=." or missing value 05:19:39 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x7f', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:40 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x200000000000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 355.165693] EXT4-fs (sda1): Unrecognized mount option "uebug_want_extra_isize=0x0000000000000000" or missing value [ 355.247730] EXT4-fs (sda1): Unrecognized mount option "journa|_path=." or missing value [ 355.314753] EXT4-fs (sda1): Unrecognized mount option "uebug_want_extra_isize=0x0000000000000000" or missing value 05:19:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journa\n_path=.']) 05:19:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'%ebug_want_extra_isize'}}], [], 0x1000000}) 05:19:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:40 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:40 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x600000000000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:40 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r2 = dup(0xffffffffffffffff) ioctl$KDSETLED(r2, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r0, 0x4b32, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:40 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 355.598426] overlayfs: filesystem on './file0' not supported as upperdir [ 355.760562] EXT4-fs (sda1): Unrecognized mount option "journa [ 355.760562] _path=." or missing value [ 355.811518] overlayfs: filesystem on './file0' not supported as upperdir 05:19:40 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x80ffff00000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 355.854241] EXT4-fs (sda1): Unrecognized mount option "%ebug_want_extra_isize=0x0000000000000000" or missing value 05:19:40 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 355.920195] EXT4-fs (sda1): Unrecognized mount option "journa [ 355.920195] _path=." or missing value 05:19:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journa*_path=.']) [ 356.124432] overlayfs: filesystem on './file0' not supported as upperdir 05:19:41 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'+ebug_want_extra_isize'}}], [], 0x1000000}) 05:19:41 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:41 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x11000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 356.391871] overlayfs: filesystem on './file0' not supported as upperdir 05:19:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journa#_path=.']) 05:19:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:41 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:41 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x20000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:41 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r2 = dup(0xffffffffffffffff) ioctl$KDSETLED(r2, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r0, 0x4b32, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) [ 356.735382] overlayfs: filesystem on './file0' not supported as upperdir 05:19:41 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'.ebug_want_extra_isize'}}], [], 0x1000000}) 05:19:41 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x7f', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:41 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x4000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journa%_path=.']) 05:19:41 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'0ebug_want_extra_isize'}}], [], 0x1000000}) 05:19:41 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 357.300155] overlayfs: filesystem on './file0' not supported as upperdir 05:19:42 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x4c00) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:42 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay&', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:42 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'lebug_want_extra_isize'}}], [], 0x1000000}) 05:19:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journa-_path=.']) 05:19:42 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r2 = dup(0xffffffffffffffff) ioctl$KDSETLED(r2, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r0, 0x4b32, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:42 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x82', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:42 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x6000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:42 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'#ebug_want_extra_isize'}}], [], 0x1000000}) 05:19:42 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() ioctl$KVM_HYPERV_EVENTFD(r4, 0x4018aebd, &(0x7f0000000000)={0x2, r4}) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journaL_path=.']) 05:19:42 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 358.199679] *** Guest State *** [ 358.203199] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 358.212702] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 358.223120] CR3 = 0x0000000000000000 [ 358.227217] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 358.238581] RFLAGS=0x00010002 DR7 = 0x0000000000000400 [ 358.286391] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 358.348716] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 358.387204] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:19:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'*ebug_want_extra_isize'}}], [], 0x1000000}) [ 358.407439] overlayfs: filesystem on './file0' not supported as upperdir [ 358.427508] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 358.483938] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:19:43 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 358.531771] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 358.608331] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 358.643902] GDTR: limit=0x00000000, base=0x0000000000000000 [ 358.666690] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:19:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)) socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journa._path=.']) [ 358.712935] IDTR: limit=0x00000000, base=0x0000000000000000 [ 358.739362] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 358.749439] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 358.779244] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 358.793944] Interruptibility = 00000000 ActivityState = 00000000 [ 358.800208] *** Host State *** [ 358.854751] RIP = 0xffffffff811f8d10 RSP = 0xffff88804f757590 [ 358.889525] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 358.929721] overlayfs: filesystem on './file0' not supported as upperdir [ 358.946034] FSBase=00007fd733fc1700 GSBase=ffff8880ae700000 TRBase=fffffe0000003000 [ 358.988938] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 359.042977] CR0=0000000080050033 CR3=000000008d2fb000 CR4=00000000001426e0 05:19:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'oebug_want_extra_isize'}}], [], 0x1000000}) [ 359.089598] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 359.123779] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 359.171346] *** Control State *** [ 359.182048] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 359.205620] EntryControls=0000d1ff ExitControls=002fefff 05:19:44 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xffffff8b, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journau_path=.']) 05:19:44 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r2 = dup(0xffffffffffffffff) ioctl$KDSETLED(r2, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r0, 0x4b32, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) [ 359.224388] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 359.253186] VMEntry: intr_info=80000306 errcode=00000000 ilen=00000000 [ 359.262890] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 359.269837] reason=80000021 qualification=0000000000000000 [ 359.283808] IDTVectoring: info=00000000 errcode=00000000 05:19:44 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x2000000000000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 359.321327] TSC Offset = 0xffffff3e1a9101e3 [ 359.346281] EPT pointer = 0x000000008ad9f01e 05:19:44 executing program 5: socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(r3, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x1009}}, 0x20) lstat(&(0x7f0000000100)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r4, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 359.493942] EXT4-fs: 24 callbacks suppressed [ 359.493957] EXT4-fs (sda1): Unrecognized mount option "oebug_want_extra_isize=0x0000000000000000" or missing value 05:19:44 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x1200000000000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_lath=.']) 05:19:44 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'cebug_want_extra_isize'}}], [], 0x1000000}) [ 359.690146] EXT4-fs (sda1): Unrecognized mount option "journal_lath=." or missing value 05:19:44 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xff1c010000000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 359.732378] *** Guest State *** [ 359.738590] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 359.764778] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 359.773950] CR3 = 0x0000000000000000 05:19:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c12") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) [ 359.778392] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 359.790103] RFLAGS=0x00010002 DR7 = 0x0000000000000400 [ 359.838611] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 359.869979] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:19:44 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x5000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 359.885313] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 359.896665] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 359.929422] EXT4-fs (sda1): Unrecognized mount option "cebug_want_extra_isize=0x0000000000000000" or missing value [ 359.970031] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:19:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_#ath=.']) [ 360.034005] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 360.042034] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 360.076636] GDTR: limit=0x00000000, base=0x0000000000000000 [ 360.098729] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 360.100711] overlayfs: filesystem on './file0' not supported as upperdir 05:19:45 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r2 = dup(0xffffffffffffffff) ioctl$KDSETLED(r2, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r0, 0x4b32, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) [ 360.129040] IDTR: limit=0x00000000, base=0x0000000000000000 [ 360.165197] EXT4-fs (sda1): Unrecognized mount option "cebug_want_extra_isize=0x0000000000000000" or missing value 05:19:45 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xfeffffff, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 360.206942] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 360.229503] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 360.238568] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 360.250474] Interruptibility = 00000000 ActivityState = 00000000 05:19:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'pebug_want_extra_isize'}}], [], 0x1000000}) [ 360.273787] EXT4-fs (sda1): Unrecognized mount option "journal_#ath=." or missing value [ 360.290821] *** Host State *** [ 360.294517] RIP = 0xffffffff811f8d10 RSP = 0xffff8880a87cf590 [ 360.305113] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 360.323629] FSBase=00007fd733fc1700 GSBase=ffff8880ae600000 TRBase=fffffe0000033000 [ 360.345108] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 360.372143] CR0=0000000080050033 CR3=0000000095e7f000 CR4=00000000001426f0 [ 360.404839] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 360.424397] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 360.465399] EXT4-fs (sda1): Unrecognized mount option "journal_#ath=." or missing value [ 360.522388] *** Control State *** [ 360.534232] EXT4-fs (sda1): Unrecognized mount option "pebug_want_extra_isize=0x0000000000000000" or missing value 05:19:45 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xa00, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 360.581041] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 360.659473] EntryControls=0000d1ff ExitControls=002fefff [ 360.667737] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 360.675003] VMEntry: intr_info=80000306 errcode=00000000 ilen=00000000 [ 360.681792] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 360.705594] reason=80000021 qualification=0000000000000000 [ 360.716507] IDTVectoring: info=00000000 errcode=00000000 [ 360.723857] overlayfs: filesystem on './file0' not supported as upperdir [ 360.730824] TSC Offset = 0xffffff3d4bba3f85 [ 360.747530] EPT pointer = 0x000000008eb2e01e 05:19:45 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) socket$kcm(0x29, 0x7, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) connect$x25(r4, &(0x7f0000000240)={0x9, @null=' \x00'}, 0x12) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r5, 0x5d2b, 0x18}, 0xc) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f0000000200)) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_+ath=.']) 05:19:45 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x11, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 360.822508] EXT4-fs (sda1): Unrecognized mount option "pebug_want_extra_isize=0x0000000000000000" or missing value 05:19:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'d\nbug_want_extra_isize'}}], [], 0x1000000}) 05:19:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x3) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x4, @dev={0xfe, 0x80, [], 0x1b}, 0xbe78}, r5}}, 0x30) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000080)={0x103fe, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r4, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 361.032346] overlayfs: filesystem on './file0' not supported as upperdir [ 361.032641] EXT4-fs (sda1): Unrecognized mount option "journal_+ath=." or missing value 05:19:45 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x7ccf1282, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:46 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r2 = dup(0xffffffffffffffff) ioctl$KDSETLED(r2, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r0, 0x4b32, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) [ 361.179435] EXT4-fs (sda1): Unrecognized mount option "d [ 361.179435] bug_want_extra_isize=0x0000000000000000" or missing value [ 361.255474] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 361.291229] FAT-fs (loop2): Filesystem has been set read-only 05:19:46 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000000)='fuseblk\x00', 0x100000, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:46 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x3000000000000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_-ath=.']) [ 361.304201] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) [ 361.334827] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) [ 361.352912] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) [ 361.363559] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) 05:19:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'d%bug_want_extra_isize'}}], [], 0x1000000}) 05:19:46 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x10000000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:46 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) socketpair(0x3, 0xa, 0x81, &(0x7f0000000000)) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_Xath=.']) 05:19:46 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x20000000000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 361.807892] *** Guest State *** [ 361.822659] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 361.870009] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 361.914150] CR3 = 0x0000000000000000 [ 361.919153] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 362.003472] RFLAGS=0x00010002 DR7 = 0x0000000000000400 05:19:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'de\nug_want_extra_isize'}}], [], 0x1000000}) [ 362.064621] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 362.071498] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:19:47 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xa00000000000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 362.153688] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:19:47 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r2 = dup(0xffffffffffffffff) ioctl$KDSETLED(r2, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r0, 0x4b32, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) 05:19:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_sath=.']) [ 362.197296] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 362.243665] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 362.251688] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 362.251707] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:19:47 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xf0ffffff, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 362.313000] GDTR: limit=0x00000000, base=0x0000000000000000 [ 362.332406] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 362.342225] IDTR: limit=0x00000000, base=0x0000000000000000 [ 362.357176] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 362.367927] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 362.378797] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 362.388803] Interruptibility = 00000000 ActivityState = 00000000 [ 362.400296] *** Host State *** 05:19:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a0") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) [ 362.411358] RIP = 0xffffffff811f8d10 RSP = 0xffff888052237590 [ 362.425291] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 362.447028] FSBase=00007fd733fc1700 GSBase=ffff8880ae600000 TRBase=fffffe0000003000 [ 362.463160] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 362.471415] CR0=0000000080050033 CR3=0000000093273000 CR4=00000000001426f0 [ 362.511459] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 05:19:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'de%ug_want_extra_isize'}}], [], 0x1000000}) 05:19:47 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x726, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_0ath=.']) [ 362.571940] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 362.581458] *** Control State *** [ 362.589238] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 362.628728] EntryControls=0000d1ff ExitControls=002fefff [ 362.684241] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 362.694278] VMEntry: intr_info=80000306 errcode=00000000 ilen=00000000 [ 362.700967] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 362.700977] reason=80000021 qualification=0000000000000000 [ 362.700987] IDTVectoring: info=00000000 errcode=00000000 [ 362.935399] TSC Offset = 0xffffff3c31a40438 [ 362.939776] EPT pointer = 0x00000000929e701e 05:19:47 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x100, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:47 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xfffffff4, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_xath=.']) 05:19:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debXg_want_extra_isize'}}], [], 0x1000000}) 05:19:48 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x22e47, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:48 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r2 = dup(0xffffffffffffffff) ioctl$KDSETLED(r2, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r0, 0x4b32, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) 05:19:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) [ 363.353658] *** Guest State *** [ 363.361282] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 363.379712] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 363.389825] CR3 = 0x0000000000000000 05:19:48 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x3f00000000000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 363.407150] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 363.421130] RFLAGS=0x00010002 DR7 = 0x0000000000000400 [ 363.429677] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 363.436542] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 363.445224] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 363.454651] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 363.462758] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 363.470955] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 363.479072] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 363.487220] GDTR: limit=0x00000000, base=0x0000000000000000 [ 363.495957] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 363.504631] IDTR: limit=0x00000000, base=0x0000000000000000 [ 363.512655] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 363.520735] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 363.527184] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 363.534741] Interruptibility = 00000000 ActivityState = 00000000 [ 363.540971] *** Host State *** [ 363.547726] RIP = 0xffffffff811f8d10 RSP = 0xffff8880505f7590 [ 363.554671] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 363.561095] FSBase=00007fd733fc1700 GSBase=ffff8880ae600000 TRBase=fffffe0000003000 [ 363.571395] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 05:19:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_cath=.']) 05:19:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debog_want_extra_isize'}}], [], 0x1000000}) 05:19:48 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x626000000000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 363.625516] CR0=0000000080050033 CR3=000000008ffca000 CR4=00000000001426f0 [ 363.682680] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 363.732312] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 363.742125] *** Control State *** [ 363.749449] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 363.812546] EntryControls=0000d1ff ExitControls=002fefff 05:19:48 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x700, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 363.868193] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 363.883850] VMEntry: intr_info=80000306 errcode=00000000 ilen=00000000 [ 363.890559] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 363.906629] reason=80000021 qualification=0000000000000000 [ 363.913168] IDTVectoring: info=00000000 errcode=00000000 [ 363.925908] TSC Offset = 0xffffff3b58065d55 [ 363.930441] EPT pointer = 0x00000000a91ea01e 05:19:48 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000400)={0xa, 0x4, 0xfa00, {r4}}, 0xc) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) mremap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x3000, 0x2, &(0x7f0000ffb000/0x3000)=nil) getuid() lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) getsockopt$packet_buf(r6, 0x107, 0x6, &(0x7f0000000480)=""/3, &(0x7f00000004c0)=0x3) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r5, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$netlink_NETLINK_PKTINFO(r6, 0x10e, 0x3, &(0x7f0000000000)=0x6, 0x4) [ 364.092767] overlayfs: filesystem on './file0' not supported as upperdir 05:19:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_oath=.']) 05:19:49 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xfffffdf9, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'deb%g_want_extra_isize'}}], [], 0x1000000}) [ 364.391436] *** Guest State *** [ 364.404503] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 05:19:49 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x3, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:49 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r2 = dup(0xffffffffffffffff) ioctl$KDSETLED(r2, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r0, 0x4b32, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 364.443332] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 364.483515] CR3 = 0x0000000000000000 [ 364.487410] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 05:19:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_\nath=.']) [ 364.502165] RFLAGS=0x00010002 DR7 = 0x0000000000000400 [ 364.510843] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 364.526224] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 364.538845] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 364.549333] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 364.598549] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 364.614138] EXT4-fs: 21 callbacks suppressed [ 364.614151] EXT4-fs (sda1): Unrecognized mount option "deb%g_want_extra_isize=0x0000000000000000" or missing value [ 364.639821] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 364.650774] overlayfs: filesystem on './file0' not supported as upperdir [ 364.712811] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:19:49 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x8, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 364.793630] GDTR: limit=0x00000000, base=0x0000000000000000 [ 364.810371] EXT4-fs (sda1): Unrecognized mount option "journal_ [ 364.810371] ath=." or missing value [ 364.832878] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:19:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debcg_want_extra_isize'}}], [], 0x1000000}) [ 364.855316] IDTR: limit=0x00000000, base=0x0000000000000000 [ 364.887987] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 364.952674] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 364.963753] overlayfs: filesystem on './file0' not supported as upperdir [ 364.972322] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 05:19:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_uath=.']) 05:19:49 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x1020, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 365.042163] Interruptibility = 00000000 ActivityState = 00000000 [ 365.085554] *** Host State *** [ 365.123167] EXT4-fs (sda1): Unrecognized mount option "debcg_want_extra_isize=0x0000000000000000" or missing value [ 365.134602] RIP = 0xffffffff811f8d10 RSP = 0xffff88804d77f590 [ 365.174049] EXT4-fs (sda1): Unrecognized mount option "journal_uath=." or missing value [ 365.180802] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 365.203601] FSBase=00007fd733fc1700 GSBase=ffff8880ae600000 TRBase=fffffe0000003000 [ 365.233066] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 365.241440] EXT4-fs (sda1): Unrecognized mount option "debcg_want_extra_isize=0x0000000000000000" or missing value [ 365.244820] CR0=0000000080050033 CR3=00000000937f9000 CR4=00000000001426f0 [ 365.310596] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 365.327557] EXT4-fs (sda1): Unrecognized mount option "journal_uath=." or missing value [ 365.335853] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 365.335864] *** Control State *** [ 365.374771] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 365.381479] EntryControls=0000d1ff ExitControls=002fefff [ 365.465082] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 365.493787] VMEntry: intr_info=80000306 errcode=00000000 ilen=00000000 [ 365.500688] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 365.507966] reason=80000021 qualification=0000000000000000 [ 365.529416] IDTVectoring: info=00000000 errcode=00000000 [ 365.536798] TSC Offset = 0xffffff3acd543043 [ 365.546160] EPT pointer = 0x000000008e06301e 05:19:50 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$mouse(0x0, 0xfffffffffffffffd, 0x2e03ff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() getsockopt$inet6_mreq(r2, 0x29, 0x1f, &(0x7f0000000100)={@remote, 0x0}, &(0x7f0000000200)=0x14) recvfrom$packet(r2, &(0x7f00000000c0)=""/28, 0x1c, 0x10160, &(0x7f0000000240)={0x11, 0xfe, r6, 0x1, 0x1, 0x6, @broadcast}, 0x14) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r4, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r5, 0x40045532, &(0x7f0000000000)=0x4) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:50 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x8bffffff00000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_*ath=.']) 05:19:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debig_want_extra_isize'}}], [], 0x1000000}) 05:19:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:50 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r2 = dup(0xffffffffffffffff) ioctl$KDSETLED(r2, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 365.686225] EXT4-fs (sda1): Unrecognized mount option "journal_*ath=." or missing value [ 365.698848] FAT-fs (loop2): bogus number of reserved sectors 05:19:50 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x20000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 365.755141] FAT-fs (loop2): Can't find a valid FAT filesystem [ 365.804307] EXT4-fs (sda1): Unrecognized mount option "debig_want_extra_isize=0x0000000000000000" or missing value [ 365.810480] *** Guest State *** [ 365.839376] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 365.863641] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 365.880462] EXT4-fs (sda1): Unrecognized mount option "journal_*ath=." or missing value [ 365.888236] CR3 = 0x0000000000000000 [ 365.892782] overlayfs: filesystem on './file0' not supported as upperdir [ 365.897026] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 05:19:50 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x2607, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 365.941471] RFLAGS=0x00010002 DR7 = 0x0000000000000400 [ 365.970080] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 365.999894] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 366.019973] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 366.040049] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:19:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_iath=.']) [ 366.067041] EXT4-fs (sda1): Unrecognized mount option "debig_want_extra_isize=0x0000000000000000" or missing value [ 366.104550] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 366.123642] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 366.134482] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 366.162792] GDTR: limit=0x00000000, base=0x0000000000000000 05:19:51 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x9, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 366.193074] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:19:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'deblg_want_extra_isize'}}], [], 0x1000000}) [ 366.285994] IDTR: limit=0x00000000, base=0x0000000000000000 [ 366.345021] overlayfs: filesystem on './file0' not supported as upperdir [ 366.369859] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:19:51 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x4000000000000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 366.442984] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 366.489875] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 366.549709] Interruptibility = 00000000 ActivityState = 00000000 [ 366.586540] *** Host State *** [ 366.589825] RIP = 0xffffffff811f8d10 RSP = 0xffff88804dc97590 [ 366.602075] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 366.623922] FSBase=00007fd733fc1700 GSBase=ffff8880ae700000 TRBase=fffffe0000003000 [ 366.631809] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 366.642893] CR0=0000000080050033 CR3=0000000091607000 CR4=00000000001426e0 [ 366.655974] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 366.662735] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 366.670919] *** Control State *** [ 366.675332] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 366.697525] EntryControls=0000d1ff ExitControls=002fefff [ 366.704547] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 366.711494] VMEntry: intr_info=80000306 errcode=00000000 ilen=00000000 [ 366.718708] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 366.727466] reason=80000021 qualification=0000000000000000 [ 366.739203] IDTVectoring: info=00000000 errcode=00000000 [ 366.747112] TSC Offset = 0xffffff3a09ccf834 [ 366.751560] EPT pointer = 0x000000009147801e 05:19:51 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0xa6, 0xfff}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000100)=@sack_info={r3, 0x3, 0x2}, 0xc) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r5 = syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0xfffffffffffffffd, 0x0, 0x142, 0x4}}, 0x483) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) getrusage(0x8e85c50f11969d89, &(0x7f0000000200)) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r8 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r7, 0x4138ae84, &(0x7f00000002c0)={{0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {}, {}, 0x0, 0x0, 0x0, 0xffffffffffffffff}) ioctl$KVM_RUN(r7, 0xae80, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000400)={0x6f28, 0x1, 0x1, r8}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:19:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'deb\ng_want_extra_isize'}}], [], 0x1000000}) 05:19:51 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r2 = dup(0xffffffffffffffff) ioctl$KDSETLED(r2, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 05:19:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_%ath=.']) 05:19:51 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x700000000000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 366.879313] FAT-fs (loop2): bogus number of reserved sectors [ 366.918847] FAT-fs (loop2): Can't find a valid FAT filesystem 05:19:51 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x80000000000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_dath=.']) 05:19:51 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@local, @in=@remote}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000000)=0xe8) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r4, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debdg_want_extra_isize'}}], [], 0x1000000}) 05:19:52 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xedc000000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 367.351737] *** Guest State *** [ 367.376287] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 05:19:52 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x5260000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 367.424590] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 367.436565] CR3 = 0x0000000000000000 [ 367.440557] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 367.481246] RFLAGS=0x00010002 DR7 = 0x0000000000000400 [ 367.529032] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 367.553856] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:19:52 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xff00, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 367.628868] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:19:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_.ath=.']) 05:19:52 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r2 = dup(0xffffffffffffffff) ioctl$KDSETLED(r2, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 05:19:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debpg_want_extra_isize'}}], [], 0x1000000}) [ 367.673610] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 367.686155] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 367.694727] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 367.703223] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:19:52 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x408, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 367.745884] GDTR: limit=0x00000000, base=0x0000000000000000 [ 367.755206] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 367.763305] IDTR: limit=0x00000000, base=0x0000000000000000 [ 367.772128] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 367.781667] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 367.792602] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 367.801977] Interruptibility = 00000000 ActivityState = 00000000 [ 367.809810] *** Host State *** [ 367.813104] RIP = 0xffffffff811f8d10 RSP = 0xffff888052237590 [ 367.819616] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 367.826404] FSBase=00007fd733fc1700 GSBase=ffff8880ae600000 TRBase=fffffe0000033000 [ 367.834666] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 367.853744] CR0=0000000080050033 CR3=00000000a653b000 CR4=00000000001426f0 [ 367.872746] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 367.920591] overlayfs: filesystem on './file0' not supported as upperdir [ 367.927649] FAT-fs (loop2): bogus number of reserved sectors [ 367.942904] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 367.960780] FAT-fs (loop2): Can't find a valid FAT filesystem [ 367.983652] *** Control State *** [ 367.998114] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 05:19:52 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x40000000000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 368.029006] EntryControls=0000d1ff ExitControls=002fefff [ 368.090832] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 05:19:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debsg_want_extra_isize'}}], [], 0x1000000}) [ 368.150930] VMEntry: intr_info=80000306 errcode=00000000 ilen=00000000 [ 368.163185] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 368.215191] reason=80000021 qualification=0000000000000000 [ 368.262494] IDTVectoring: info=00000000 errcode=00000000 [ 368.293272] TSC Offset = 0xffffff39389b22be [ 368.316232] EPT pointer = 0x000000009344601e 05:19:53 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r3 = syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000000)=0x9085) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000001a80)={0x0, 0x100000001, 0x47a, 0x2, 0x8, 0x20675393, 0x1000, 0x3, {0x0, @in6={{0xa, 0x4e24, 0xff, @remote, 0x9ab}}, 0xffffffff, 0xffff, 0x6, 0x9, 0x4}}, &(0x7f0000001b40)=0xb0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000001b80)={0x0, 0x80000000}, &(0x7f0000001bc0)=0x8) sendmsg$inet_sctp(r0, &(0x7f0000001d40)={&(0x7f00000000c0)=@in6={0xa, 0x4e22, 0x100000000, @empty, 0x400}, 0x1c, &(0x7f00000019c0)=[{&(0x7f0000000200)="03bda77a8b224a75ac0d3e15a84ef8fd28e701b193c08ad7722284800ae232adecb733af1ad37a322b9941f401d120dbbbbf233670da8e4e4041b1bc2a8885a173465283cc2b9579c0f84da824bf2020d0efcf1d18b3968df9633aaf0e69b5243121fb09d4d7f5f6da1dc455bc23448d1647897bdb9d965d2d06fba796719521fcd1ee80baa7b923129237fbd32a8d", 0x8f}, {&(0x7f0000000480)="997db3255a12da2c5b86422dca9e28b3a061d8284ee6b1123d455b8b5af6f23f6ebaf1f149d1273731d4ceceeb948106cd41d181a83253011719ed3086bda6893244d3173d88e3444e9065e0129851a3bd3b3b925a4c06a729cf57840d7fb195cbb201b51b7c64f016827f95078e012892c5632111a69521c7f37c3f20c53d72423c542e0e02f787098fe0c642970232bf476c908ecce3e3ca15fbae3e7676cb698c807a7465dbfc90d9f161360f90caf993b99faa4f83eae30a1873674dbe255177add20ef2deb8e49fe259bdd170ae5d04618e68e403a1fd56ba5b31ab398ffc89bd17d1fc925df28dd9e9842b11b149d56d60ac41e8f4d629", 0xfa}, {&(0x7f0000000580)="d4ae7cf9b16d8fb023b02e04d4362142cb1b2c98dc18630b5cd635a5c496d0d6ab7b97d9ba01cc1c8f11e8d90974c53dc7be133986c39d262362cb7990f4f668866b4eae039906d39c67b47b0b22df42f7be8e6ab8de941e700296b4cf43b4ebb3bbd3fca51050cd3f6c677b327817b1e9082e2448267f45b02b4597120cfa0131e58ac459f02c", 0x87}, {&(0x7f0000000680)="15d84291aeeccc196fbf9101001c64f2854f2be807c42c741c76f6c3b652e33a51ca95ca23ef82923b6aa5687d485f7e679871338448372c170a5187fa65265c4cee0451e0036b0a669fdc99f748bb001dce8dedda57e5b8725ff0c5eb66db0787210838ec091d626d3e175c384afc95d352f45efac43feb34e8bab0fcafed8299b001b2935bfb1a0100c5dd03", 0x8d}, {&(0x7f0000000100)="fdd62894564213bbea4ab18faef104bf10e4b42d4bf507cc77a1ad91", 0x1c}, {&(0x7f0000000740)="acd63d952db953540e488e14245afb53295d7310018a18645759cf69aa5229e52e9fb04e35af66b4f2570b1ddd39a7f89d5e1cf6fd0d5213675b34d5ce5e367e52aaacd7bed20ea32877e9153a70516de85c1a66e1f88e8337b3cc96da985ee175a52ec672176c93564cb493a93e8900a94115b40bfb9f16cf3158b1881d02588b6421221ad7a2a0175eed6b5a84faad4f94ea17073a134960bfdd6e7298a0fb48243f6b4372a540de4ca2f30ba8fa3f4209acaf532f725a1878bacb8154b749bed19c1db6776380e9ccfabf92d09d26f825ad4356940a540ae4c7a1595a4c33d765a4c9741ae11a206c78ad97ebf5e729009cb9825127", 0xf7}, {&(0x7f0000000400)="efab40f893f4a6bd679f0f5ef62f96c8005fc562f355549f", 0x18}, {&(0x7f0000000840)="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", 0x1000}, {&(0x7f0000001840)="64167d0cb5c5987f6f55caa3d179597405e0a459947e619255ef2c6ef968a005c460b95610dd26e8d3af58988aa131175863423a3f04ed4730f1e3590577261a21c75650e6ffdf04f73e394c9973512c4211259698bc", 0x56}, {&(0x7f00000018c0)="1ffad3572dc53a8de48660cb2b7125d729e3756b8d43757e568baba5f821ee826974d465f2ad7eef9f567b3b95494e4ba0c3e830e4cf1125b8cbd5a91c5eb1588740392c6db8b3b85e835184ac9cdf7f6786fbe43b9a7bec734350012d18487941d256fd7d4edac11699f4f03b9b7e71a3116f06c5e9ff364ec0a933725e4ea74c7044b1438eda50c0a12214fc8edfed0e2a24ba4b92792d5e7e7398175ce1732cbdc5251c519760e2a1257b11c9f32fd9e8f4b1f8906aac7a897e9e8f5dc22978cf304f9fda4d243366146377255bcdbce7515fd68a3ffb", 0xd8}], 0xa, &(0x7f0000001c00)=[@dstaddrv6={0x20}, @dstaddrv4={0x18, 0x84, 0x7, @remote}, @dstaddrv6={0x20, 0x84, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast1}, @authinfo={0x18, 0x84, 0x6, {0x5}}, @prinfo={0x18, 0x84, 0x5, {0x20, 0xfffffffffffffff8}}, @dstaddrv4={0x18, 0x84, 0x7, @remote}, @sndrcv={0x30, 0x84, 0x1, {0x5, 0x3, 0x8000, 0x0, 0x0, 0x9a9, 0x7ff, 0x8, r6}}, @sndrcv={0x30, 0x84, 0x1, {0x400, 0x2db, 0x2, 0x1, 0x2, 0x9, 0x0, 0x4, r7}}], 0x118, 0x20000000}, 0x1) lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r5, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:19:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_p\nth=.']) 05:19:53 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xffffff7f, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:53 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x40000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debxg_want_extra_isize'}}], [], 0x1000000}) [ 368.723831] *** Guest State *** [ 368.733780] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 368.742664] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 368.742672] CR3 = 0x0000000000000000 [ 368.742681] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 368.742692] RFLAGS=0x00010002 DR7 = 0x0000000000000400 [ 368.742707] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 368.742721] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:19:53 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r2 = dup(0xffffffffffffffff) ioctl$KDSETLED(r2, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) ioctl$KDSETLED(r0, 0x4b32, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 05:19:53 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xff0f0000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 368.834318] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 368.862836] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 368.872013] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 368.880408] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 368.888569] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 368.896756] GDTR: limit=0x00000000, base=0x0000000000000000 [ 368.906609] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 368.914996] IDTR: limit=0x00000000, base=0x0000000000000000 [ 368.922987] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 368.931435] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 368.938178] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 368.946823] Interruptibility = 00000000 ActivityState = 00000000 [ 368.953054] *** Host State *** [ 368.956871] RIP = 0xffffffff811f8d10 RSP = 0xffff888050bef590 [ 368.963114] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 369.003073] FSBase=00007fd733fc1700 GSBase=ffff8880ae600000 TRBase=fffffe0000033000 05:19:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_w\nnt_extra_isize'}}], [], 0x1000000}) 05:19:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_p%th=.']) [ 369.043454] FAT-fs (loop2): bogus number of reserved sectors 05:19:54 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x7000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 369.121127] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 369.128075] FAT-fs (loop2): Can't find a valid FAT filesystem [ 369.153614] CR0=0000000080050033 CR3=000000009ef2c000 CR4=00000000001426f0 [ 369.210237] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 369.281856] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 369.333078] *** Control State *** [ 369.338434] overlayfs: filesystem on './file0' not supported as upperdir [ 369.374178] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 369.413702] EntryControls=0000d1ff ExitControls=002fefff 05:19:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_w%nt_extra_isize'}}], [], 0x1000000}) [ 369.440939] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 369.561503] VMEntry: intr_info=80000306 errcode=00000000 ilen=00000000 [ 369.613815] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 369.620577] reason=80000021 qualification=0000000000000000 [ 369.647990] IDTVectoring: info=00000000 errcode=00000000 [ 369.657107] TSC Offset = 0xffffff3880a03229 [ 369.661656] EPT pointer = 0x0000000094a8101e 05:19:54 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$VIDIOC_G_OUTPUT(r4, 0x8004562e, &(0x7f0000000000)) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x20000000000}}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:54 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x2000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_pa\nh=.']) [ 369.729447] EXT4-fs: 25 callbacks suppressed [ 369.729460] EXT4-fs (sda1): Unrecognized mount option "debug_w%nt_extra_isize=0x0000000000000000" or missing value 05:19:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:54 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x10000000000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_wa%t_extra_isize'}}], [], 0x1000000}) [ 369.838450] EXT4-fs (sda1): Unrecognized mount option "journal_pa [ 369.838450] h=." or missing value 05:19:54 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r2 = dup(0xffffffffffffffff) ioctl$KDSETLED(r2, 0x4b32, 0xe39f) ioctl$KDSETLED(r0, 0x4b32, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 369.919882] *** Guest State *** [ 369.923184] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 369.938150] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 369.950137] CR3 = 0x0000000000000000 [ 369.957671] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 369.964022] RFLAGS=0x00010002 DR7 = 0x0000000000000400 [ 369.970008] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 370.020397] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 370.032067] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 370.060567] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:19:54 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x200000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 370.106148] EXT4-fs (sda1): Unrecognized mount option "journal_pa [ 370.106148] h=." or missing value [ 370.151133] FAT-fs (loop2): bogus number of reserved sectors [ 370.179863] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 370.193068] EXT4-fs (sda1): Unrecognized mount option "debug_wa%t_extra_isize=0x0000000000000000" or missing value [ 370.211494] FAT-fs (loop2): Can't find a valid FAT filesystem 05:19:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_pa%h=.']) [ 370.266298] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:19:55 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x30000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 370.334685] overlayfs: filesystem on './file0' not supported as upperdir [ 370.351118] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 370.383572] GDTR: limit=0x00000000, base=0x0000000000000000 [ 370.451426] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 370.461004] EXT4-fs (sda1): Unrecognized mount option "journal_pa%h=." or missing value [ 370.516401] IDTR: limit=0x00000000, base=0x0000000000000000 [ 370.534586] EXT4-fs (sda1): Unrecognized mount option "debug_wa%t_extra_isize=0x0000000000000000" or missing value [ 370.556452] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 370.581470] overlayfs: filesystem on './file0' not supported as upperdir [ 370.612719] EFER = 0x0000000000000000 PAT = 0x0007040600070406 05:19:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_wan%_extra_isize'}}], [], 0x1000000}) [ 370.644436] EXT4-fs (sda1): Unrecognized mount option "journal_pa%h=." or missing value [ 370.675747] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 05:19:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) [ 370.704509] Interruptibility = 00000000 ActivityState = 00000000 [ 370.734355] *** Host State *** [ 370.745110] RIP = 0xffffffff811f8d10 RSP = 0xffff888050987590 [ 370.758237] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 370.768176] FSBase=00007fd733fc1700 GSBase=ffff8880ae700000 TRBase=fffffe0000003000 [ 370.778036] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 370.785407] CR0=0000000080050033 CR3=000000009669c000 CR4=00000000001426e0 [ 370.801669] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 370.812311] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 370.845527] *** Control State *** [ 370.855018] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 370.905608] FAT-fs (loop2): bogus number of reserved sectors [ 370.925205] EntryControls=0000d1ff ExitControls=002fefff [ 370.936949] FAT-fs (loop2): Can't find a valid FAT filesystem [ 370.937898] EXT4-fs (sda1): Unrecognized mount option "debug_wan%_extra_isize=0x0000000000000000" or missing value [ 370.985291] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 371.004541] VMEntry: intr_info=80000306 errcode=00000000 ilen=00000000 [ 371.011249] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 371.030752] reason=80000021 qualification=0000000000000000 [ 371.040375] IDTVectoring: info=00000000 errcode=00000000 [ 371.088066] TSC Offset = 0xffffff37d4abed49 [ 371.141919] EPT pointer = 0x000000008c77d01e 05:19:56 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$mouse(0x0, 0x0, 0x0) ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r4, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:56 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x30, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_pat%=.']) 05:19:56 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r2 = dup(0xffffffffffffffff) ioctl$KDSETLED(r2, 0x4b32, 0xe39f) ioctl$KDSETLED(r0, 0x4b32, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 05:19:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_\nxtra_isize'}}], [], 0x1000000}) [ 371.294912] EXT4-fs (sda1): Unrecognized mount option "journal_pat%=." or missing value 05:19:56 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x7, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 371.353973] EXT4-fs (sda1): Unrecognized mount option "debug_want_ [ 371.353973] xtra_isize=0x0000000000000000" or missing value 05:19:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_pathA.']) [ 371.492046] *** Guest State *** [ 371.508155] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 371.550991] overlayfs: filesystem on './file0' not supported as upperdir [ 371.583188] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 05:19:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_%xtra_isize'}}], [], 0x1000000}) [ 371.646877] CR3 = 0x0000000000000000 05:19:56 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xf0ffffffffffff, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) [ 371.700096] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 371.724798] RFLAGS=0x00010002 DR7 = 0x0000000000000400 [ 371.736271] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 371.744246] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 371.756340] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 371.765999] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 371.784691] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:19:56 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xa60bb74b00000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path\t.']) [ 371.802879] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 371.839828] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 371.850812] GDTR: limit=0x00000000, base=0x0000000000000000 [ 371.861817] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 371.894149] IDTR: limit=0x00000000, base=0x0000000000000000 [ 371.907180] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 371.928112] FAT-fs (loop2): invalid media value (0x00) [ 371.949394] FAT-fs (loop2): Can't find a valid FAT filesystem [ 371.968218] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 372.004396] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 372.030556] Interruptibility = 00000000 ActivityState = 00000000 [ 372.043769] *** Host State *** [ 372.050540] RIP = 0xffffffff811f8d10 RSP = 0xffff88804cd47590 [ 372.084256] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 372.128051] FSBase=00007fd733fc1700 GSBase=ffff8880ae600000 TRBase=fffffe0000033000 [ 372.172650] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 372.182687] CR0=0000000080050033 CR3=00000000895a4000 CR4=00000000001426f0 [ 372.190698] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 372.198733] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 372.208241] *** Control State *** [ 372.211753] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 372.220670] EntryControls=0000d1ff ExitControls=002fefff [ 372.230247] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 372.239324] VMEntry: intr_info=80000306 errcode=00000000 ilen=00000000 [ 372.250992] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 372.260109] reason=80000021 qualification=0000000000000000 [ 372.297480] IDTVectoring: info=00000000 errcode=00000000 [ 372.306877] TSC Offset = 0xffffff3700aa11ff [ 372.311346] EPT pointer = 0x000000008d02b01e 05:19:57 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x0) getegid() ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)) 05:19:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_ex%ra_isize'}}], [], 0x1000000}) 05:19:57 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x500000000000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:57 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r2 = dup(0xffffffffffffffff) ioctl$KDSETLED(r2, 0x4b32, 0xe39f) ioctl$KDSETLED(r0, 0x4b32, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 05:19:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path-.']) 05:19:57 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x8cffffff00000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 372.552846] *** Guest State *** [ 372.556660] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 372.572999] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 05:19:57 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') dup(0xffffffffffffffff) prctl$PR_GET_SECCOMP(0x15) ioctl$KDSETLED(r0, 0x4b32, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 372.651537] CR3 = 0x0000000000000000 05:19:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_pathc.']) 05:19:57 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x400000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) [ 372.678895] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 372.698098] RFLAGS=0x00010002 DR7 = 0x0000000000000400 [ 372.711658] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 05:19:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_ext\na_isize'}}], [], 0x1000000}) [ 372.734599] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 372.742705] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 372.780853] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 372.796377] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 372.822721] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 372.831816] overlayfs: filesystem on './file0' not supported as upperdir [ 372.840097] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 372.849682] GDTR: limit=0x00000000, base=0x0000000000000000 05:19:57 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x4000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 372.872196] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 372.883945] IDTR: limit=0x00000000, base=0x0000000000000000 [ 372.894452] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 372.902880] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 372.909635] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 372.917606] Interruptibility = 00000000 ActivityState = 00000000 [ 372.925820] *** Host State *** [ 372.929922] RIP = 0xffffffff811f8d10 RSP = 0xffff888055827590 [ 372.940060] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 372.948755] FSBase=00007fd733fc1700 GSBase=ffff8880ae600000 TRBase=fffffe0000033000 [ 373.030558] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 373.032189] FAT-fs (loop2): invalid media value (0x00) [ 373.073529] FAT-fs (loop2): Can't find a valid FAT filesystem [ 373.090038] CR0=0000000080050033 CR3=000000009ee2d000 CR4=00000000001426f0 [ 373.139462] overlayfs: filesystem on './file0' not supported as upperdir [ 373.147084] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 373.230797] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 373.270494] *** Control State *** [ 373.284154] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 373.291274] EntryControls=0000d1ff ExitControls=002fefff [ 373.406999] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 373.428991] VMEntry: intr_info=80000306 errcode=00000000 ilen=00000000 [ 373.469781] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 373.506961] reason=80000021 qualification=0000000000000000 [ 373.535386] IDTVectoring: info=00000000 errcode=00000000 [ 373.558551] TSC Offset = 0xffffff366bae8b24 [ 373.579341] EPT pointer = 0x000000009f34901e 05:19:58 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000100)) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r6 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xb1f9, 0x101000) ioctl$KVM_HYPERV_EVENTFD(r6, 0x4018aebd, &(0x7f00000000c0)={0x3, r5, 0x1}) ioctl$KVM_SET_SREGS(r4, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x200000000}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:19:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:58 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') prctl$PR_GET_SECCOMP(0x15) ioctl$KDSETLED(r0, 0x4b32, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 05:19:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_ext%a_isize'}}], [], 0x1000000}) 05:19:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path%.']) 05:19:58 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x3f00, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:58 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xf6ffffff00000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 373.860589] FAT-fs (loop2): invalid media value (0x00) [ 373.878062] FAT-fs (loop2): Can't find a valid FAT filesystem [ 373.962037] *** Guest State *** [ 373.993810] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 05:19:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extr\n_isize'}}], [], 0x1000000}) 05:19:58 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x600, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB="6a6f75726e616c5f70617468182e"]) [ 374.092384] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 374.220542] CR3 = 0x0000000000000000 [ 374.263279] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 374.324275] overlayfs: filesystem on './file0' not supported as upperdir [ 374.344727] RFLAGS=0x00010002 DR7 = 0x0000000000000400 [ 374.357921] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 374.385502] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 374.412239] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 374.424683] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 374.432693] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:19:59 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xfffff000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 374.460147] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 374.473884] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 374.482195] GDTR: limit=0x00000000, base=0x0000000000000000 05:19:59 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') prctl$PR_GET_SECCOMP(0x15) ioctl$KDSETLED(r0, 0x4b32, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 374.553571] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 374.577405] IDTR: limit=0x00000000, base=0x0000000000000000 [ 374.598075] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 374.608344] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 374.615681] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 374.623239] Interruptibility = 00000000 ActivityState = 00000000 [ 374.633314] *** Host State *** [ 374.650836] RIP = 0xffffffff811f8d10 RSP = 0xffff888056a7f590 [ 374.672154] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 374.679215] FSBase=00007fd733fc1700 GSBase=ffff8880ae700000 TRBase=fffffe0000033000 [ 374.696978] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 374.706506] CR0=0000000080050033 CR3=00000000917ea000 CR4=00000000001426e0 [ 374.716807] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 374.730894] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 374.738611] *** Control State *** [ 374.742151] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 374.749452] EntryControls=0000d1ff ExitControls=002fefff 05:19:59 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) dup(r0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r4, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:19:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:19:59 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xb000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:19:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=A']) 05:19:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extr%_isize'}}], [], 0x1000000}) [ 374.755266] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 374.762218] VMEntry: intr_info=80000306 errcode=00000000 ilen=00000000 [ 374.772502] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 374.779604] reason=80000021 qualification=0000000000000000 [ 374.786259] IDTVectoring: info=00000000 errcode=00000000 [ 374.791786] TSC Offset = 0xffffff35b00f3b74 [ 374.798165] EPT pointer = 0x0000000093ab301e [ 374.932978] overlayfs: filesystem on './file0' not supported as upperdir [ 375.047238] EXT4-fs: 21 callbacks suppressed [ 375.047251] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr%_isize=0x0000000000000000" or missing value 05:19:59 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xff000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 375.106873] *** Guest State *** [ 375.108718] EXT4-fs (sda1): Cannot specify journal on remount [ 375.116709] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 375.143639] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 375.184211] CR3 = 0x0000000000000000 [ 375.187979] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 375.240511] RFLAGS=0x00010002 DR7 = 0x0000000000000400 [ 375.247203] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr%_isize=0x0000000000000000" or missing value [ 375.288895] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 05:20:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_i*ize'}}], [], 0x1000000}) [ 375.338260] EXT4-fs (sda1): Cannot specify journal on remount [ 375.357005] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:20:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=\n']) [ 375.415475] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 375.453770] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 375.494582] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:20:00 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xff010000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 375.573941] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 375.607693] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 375.626049] EXT4-fs (sda1): Cannot specify journal on remount [ 375.641798] GDTR: limit=0x00000000, base=0x0000000000000000 [ 375.674530] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i*ize=0x0000000000000000" or missing value [ 375.689421] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:20:00 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') prctl$PR_GET_SECCOMP(0x15) ioctl$KDSETLED(r0, 0x4b32, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 05:20:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) [ 375.719376] IDTR: limit=0x00000000, base=0x0000000000000000 [ 375.744353] EXT4-fs (sda1): Cannot specify journal on remount [ 375.751648] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 375.765954] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 375.773002] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 375.781048] Interruptibility = 00000000 ActivityState = 00000000 [ 375.787734] *** Host State *** [ 375.791035] RIP = 0xffffffff811f8d10 RSP = 0xffff888050327590 [ 375.797437] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 375.805469] FSBase=00007fd733fc1700 GSBase=ffff8880ae700000 TRBase=fffffe0000003000 [ 375.813774] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 05:20:00 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x800000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 375.819855] CR0=0000000080050033 CR3=0000000091438000 CR4=00000000001426e0 [ 375.827307] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 375.834522] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 375.840716] *** Control State *** [ 375.844561] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 375.851337] EntryControls=0000d1ff ExitControls=002fefff [ 375.857371] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 375.864654] VMEntry: intr_info=80000306 errcode=00000000 ilen=00000000 [ 375.874896] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 375.889418] reason=80000021 qualification=0000000000000000 [ 375.896190] IDTVectoring: info=00000000 errcode=00000000 [ 375.904009] TSC Offset = 0xffffff350fce80b7 [ 375.912934] EPT pointer = 0x000000008c57201e 05:20:00 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000000)={0x1000, 0x2, 0x7, 0x8, 0x100, 0x1, 0x3}) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r4, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 375.997853] overlayfs: filesystem on './file0' not supported as upperdir 05:20:00 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x900, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:20:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=%']) 05:20:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_ipize'}}], [], 0x1000000}) [ 376.174233] *** Guest State *** [ 376.177559] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 376.245015] EXT4-fs (sda1): Cannot specify journal on remount [ 376.334024] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ipize=0x0000000000000000" or missing value [ 376.352532] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 376.362565] overlayfs: filesystem on './file0' not supported as upperdir [ 376.439814] CR3 = 0x0000000000000000 [ 376.453927] EXT4-fs (sda1): Cannot specify journal on remount [ 376.467001] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 05:20:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=/']) [ 376.507683] RFLAGS=0x00010002 DR7 = 0x0000000000000400 [ 376.545218] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 05:20:01 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x526, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 376.590323] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 376.614859] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:20:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_ixize'}}], [], 0x1000000}) [ 376.669979] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 376.685075] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 376.750856] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:20:01 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) dup(0xffffffffffffffff) prctl$PR_GET_SECCOMP(0x15) ioctl$KDSETLED(r0, 0x4b32, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 05:20:01 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x40000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:20:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(0x0, 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) [ 376.877105] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 376.888857] GDTR: limit=0x00000000, base=0x0000000000000000 [ 376.897534] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 376.912042] IDTR: limit=0x00000000, base=0x0000000000000000 [ 376.920362] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 376.928469] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 376.935016] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 376.942611] Interruptibility = 00000000 ActivityState = 00000000 [ 376.948958] *** Host State *** [ 376.952177] RIP = 0xffffffff811f8d10 RSP = 0xffff88804f80f590 [ 376.958334] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 376.965093] FSBase=00007fd733fc1700 GSBase=ffff8880ae600000 TRBase=fffffe0000033000 05:20:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000240)) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='joth=.']) write$P9_RWRITE(r0, &(0x7f0000000140)={0xb, 0x77, 0x1, 0x3ff}, 0xb) [ 376.972888] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 376.978897] CR0=0000000080050033 CR3=0000000086b64000 CR4=00000000001426f0 [ 376.987150] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 377.003858] overlayfs: filesystem on './file0' not supported as upperdir [ 377.010794] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 377.017197] *** Control State *** [ 377.020704] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 05:20:01 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x1caaa1a6, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 377.027435] EntryControls=0000d1ff ExitControls=002fefff [ 377.032892] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 377.041035] VMEntry: intr_info=80000306 errcode=00000000 ilen=00000000 [ 377.055540] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 377.062558] reason=80000021 qualification=0000000000000000 [ 377.069193] IDTVectoring: info=00000000 errcode=00000000 [ 377.074876] TSC Offset = 0xffffff347deef069 [ 377.079367] EPT pointer = 0x00000000929fc01e 05:20:02 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r3 = getpgid(0x0) getresuid(&(0x7f0000000400), &(0x7f0000000580)=0x0, &(0x7f00000005c0)) lstat(&(0x7f0000000600)='./file1\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpid() fstat(r2, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = socket$bt_bnep(0x1f, 0x3, 0x4) r10 = fcntl$getown(r0, 0x9) getresuid(&(0x7f0000000f80), &(0x7f0000000fc0), &(0x7f0000001000)=0x0) fstat(r0, &(0x7f0000001040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r1, &(0x7f0000003680)=[{&(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000480)="cb05a7cdcd4f79ab628830c918b9a51e2f54acc6c8b94c87fe1fa0769d2b4dee1596fb83ffde4e7e55cd5fd6159e0623a50ccab99e81d6839c7e70dcd44d8e32a03e721b3ca772fd98f7cd82b69456415fc6744110b339e3844cf74881c04e660dd47252aabf1e109ae8c3fc05614eb61b8b1ba6f912b75889d9d5d8184e047c65719bef5a9ef86ae60c73b062095cee5685f22ee87a7dafec74b31928792685574763655080254dd4b0d09988d5865cc6adb2454619002fa64d155888f0f5db2df9ecd4a9db44", 0xc7}, {&(0x7f0000000240)="d207542d75fea43665c5e8e880f9341ae4d179e057489fabca1713a8506b368a211e402e8ef731ec2905009cd643ed368151108f1a4c5f6244d278a8eff8", 0x3e}], 0x2, &(0x7f0000000800)=[@cred={0x20, 0x1, 0x2, r3, r4, r5}, @cred={0x20, 0x1, 0x2, r6, r7, r8}], 0x40, 0x40000}, {&(0x7f0000000840)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000bc0)=[{&(0x7f00000008c0)="7ca2ef36bc77991cbc3094e383cd97bc4383540a2fd9a4840be7097cfbca66dcae20c46d3869e23872d9fab13b4f13da07ccc8b918461f5cd5fbf678956b5ac7df89030df42d3150451d8daf841f01f84992c461fb076ad4a96aaa1d921256140ab4551e5f25dcf1c7c9b61e7c561b823af96365de4594b3a885c81970b6d42ec86c31f774ef0d5972d58dc5fbdebe4426dd87d0d68954be36da4bf9e89eabe5e99e08e464550eea7399a2d6b5e36c49688468fb0a365e308c5beb659fffbe980075f8252055d403372367bc91650bc2", 0xd0}, {&(0x7f00000009c0)="a114e11bd35957b489781c2b035c150467abfeab66b8249dacc59573c815ea128436f56079180e979a5f71c19adf04096ce6816200deff", 0x37}, {&(0x7f0000000a00)="c468719ecc1b9a9844a8623475d6b313d8795e84fdd0db084f7a1b213635f79291c6eadc8d6f43c306c8b84d10df1e56481acd7989a24b5596b7fc30238a2918d4de760486fb01a6ebfab307da73ce0e4b934309fdcba8e547ffb25669b8112b6684a8bfcad265b848e8d9f629176c3a0772c17c4cb1bceeb81a6ccbf789447ee252c38866649cde8162bdbc7c317c1b81d1ed", 0x93}, {&(0x7f0000000ac0)="36bd4a3d6ee7b000d150300211356ac455b91525a773491ffe9c6295b28f828497a2584bb6b97d51c69298ec9341dbbac1f35e27dc5765996561c7cad0aa3a8230d52ec5ed4c39affc2823e642170466709e351fc9a6e7b295de", 0x5a}, {&(0x7f0000000b40)="c9b1c056726d77b28aa728e4fac2b5941387f402e314d704d0e40a973174ffe15eb83eae27a0bae88dc99aa62a7ab788ee5ea616eedf88a7422bf0576623dab0eaba0e1e2bb7c6676ac310619b95853bdf005bc93dbf50a5f3aeeb49eabca45a18f3bdb7794007b7e49cbdf79ca507d7c65d07fb8189cb0b9a", 0x79}], 0x5, 0x0, 0x0, 0x20000010}, {&(0x7f0000000c40)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000000f40)=[{&(0x7f0000000cc0)="7a8d4405c9020e14f067c26f1fb0d9aa314c8c7458c90fd2a8da492bb59c1d7a1a7ff201563e271fe6d891cd92e3a7440cc58b88247b9507ed712a689b55b8e5cfabf2e763dc360bf43b8296c27c66c7b4ff73d22eb000b89ab2e52a9443200cf1ae310b58ba2aecfcc79832979ad309d0e11fe9cbc6ac20936349be67784bfb27fd31adcb8cd09e040e750dc7e3b95ab50a0bac1457b8170e2737a19cfd3d3652e39559528f42741340415312c2557e149ef3c65114994641cbdfd7b5ecdaebef9afc3f45138b30df75015d70d25d306440e96d424a9fbf2fa449f37f0d522e4327", 0xe2}, {&(0x7f0000000dc0)="fc22a23b2cbb4fd0cf16038cd59639104afca4ed42d0567845a27c1fbf38c7fb129753ce6b910f319bd61b5b0330905a5fb90a4513f2eb88f38f4faeb8488d1b44c4c2d9834e1839012f6084174b9ae69d3eda755091", 0x56}, {&(0x7f0000000e40)="685004d797f1406c636efd168997a2a3c77a621c5caed61bf7a2d7ebc5c714a4cf2a4f1b6410b0b013be7417e4624616150d3a910968c8a3f798d3acc76983c89ce43f3ba575a2e0ec5493dc83475bca0efd8aa982c84f24d88757815f3ca060cf4c9c90c4cca0737f956f74c09d0263c80de08c65c62e80552fc14cef3e7b36a9989518056364873463ed297d75b668aa53b5a15b53b1b28a3dbb869de6583287f243eb34ec505621a39013afe125f30d348dfb65e2b5f7b70a3005c661794b879ff1eb7bad28efd3a3e7183227bd9c205266d9ce57f2b2d8febd927cf3abc62011fb5b5ef9cd19b05ffef3ff3bd54498e968a27600065b4b", 0xf9}], 0x3, &(0x7f00000010c0)=[@rights={0x38, 0x1, 0x1, [r1, r1, r1, r0, r1, r1, r9, r0, r1]}, @rights={0x20, 0x1, 0x1, [r0, r1, r0]}, @cred={0x20, 0x1, 0x2, r10, r11, r12}], 0x78, 0x4}, {&(0x7f0000001140)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000003600)=[{&(0x7f00000011c0)="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", 0x1000}, {&(0x7f00000021c0)="d1cde279bd5ed8cec445fd28fa96fe9d8e9d53c2efd77a7c62c00bde27c4689da608f239bed1c6e3e55736ba25525bf1c5fd9e755edbb2739ac24d8e19c82716de859defb6f10cf733ae9283999052746fcded0ade4e27aa0a7ac04bd9a5ebdac2410c28f3eefad4ead91f9f4ce4f4f6a55b2bca40ec5b10bfec59cb79ec298a11d5d0877bf3da327c3618ca5c0c4d175b7a9f5b3b330e96f0479f1c580b1daf92ba28fe48680b8095433b836c466c804c9d04b596ca51478052e6c9fc7e42104916ac258508f8f9359dfa010d4ed7104ebaf433fc88", 0xd6}, {&(0x7f00000022c0)="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", 0x1000}, {&(0x7f00000032c0)="56cd3bee2e580bb6a5fac512621b29bc00ac794a035f28d4989c44d9fa1fc4c064014b2db5d4d394cbf63589bf2cddccdd52a86448842d9d07202bc5a9a268ef3d1b1c08c0ee8302ce96393e5ba962b2ef5977e4019e3228f9e03154659f49b21b5140fa4c4b10891cc1f11be1f994686b52739b15106e9329", 0x79}, {&(0x7f0000003340)="65f1c39707c8416ad344a850702de59d035207a230923838157d17f2a52b29d4a0fe835bd0dd08070dd205b3cdf3efdbd0e1b07891579859595d447779eeffb5c352068426e0daa5f623b730f78e3d471f", 0x51}, {&(0x7f00000033c0)="439f78b9f29c0bd68f8f601b0bd9d5933d88858d4dd946599b5d2ebeb7046b76ddb079845f33afd98f7c5f5666f90da2cb05153deff5a3a6ff1f41bd551b42300520d273423f29157fe088777dbcf250d0dc3548f0693edb0bea604fe90f676fa3b6e8c8741f9823eb6398f91c1b7f2f0f1fde662debf32b8c51c69ef012ff49a368a6a096bad0616d06bc63af43d7912bd84cb1857722d1fcbc1b895e51a385cf8221ee806576c242d9f9bd159f073454275b8e33b0812080e3c9ea870770f8f011326c0370a96df5843e51d0cc4ae27632a917f9b607616ede381f243f467ce79ab93516dfb23526ff2f9c", 0xec}, {&(0x7f00000034c0)="abb05ac1bb21ef3e1dfbe9baac7603c01b7a2843a50232f4d3d417f52b86ca0a9326deafb046b25d5e2946a656cbcff929b5c062b4871cb300c57102a0db930bee9cc26dfe55c0a7fb0865c4b5a2e155282eaa7006b95e40d63a796aed463d9702caa5d0d3f7dddf26168d870c456e7ea5c1ff74c9daa7e7cc9b844b3a536688b3fa9aab179a3396a81fe0e2658d7e55ed897febab7d0f4a239453d493de638b5617de56d5f8a271755b32181e7fd900d83ea4225011ae4cbb6e419616a9221108861ab0d7c253f941b97862b9eaf26ce587fd8ca313614e8941aca9728df0f7ae130c19f25b877377032ec29afa", 0xee}, {&(0x7f00000035c0)="3bed16aab52cdf0141a0339ebf6ef161cd289506802668cff7171b10966fce59fd23f6d7cc8f8368a5d23a1f9d399bc7e4bc9317e9ab836501", 0x39}], 0x8, 0x0, 0x0, 0x4000000}], 0x4, 0x4) r13 = syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x400000000, 0x0, 0x200106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r13, 0x80045300, &(0x7f0000000000)) r14 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r15 = ioctl$KVM_CREATE_VCPU(r14, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r14, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000001000/0x1000)=nil}) r16 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r16, 0xc004aea7, &(0x7f0000000100)=0x1000) getuid() lstat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r15, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r15, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r15, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$bt_BT_VOICE(r16, 0x112, 0xb, &(0x7f0000003780)=0x60, 0x2) 05:20:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_i+ize'}}], [], 0x1000000}) [ 377.355116] *** Guest State *** 05:20:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x3, 0x2000) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file0\x00', r0}, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:20:02 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xf000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 377.395722] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 377.499959] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 377.571526] CR3 = 0x0000000000000000 05:20:02 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xff0f, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:20:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_i#ize'}}], [], 0x1000000}) [ 377.610095] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 377.687450] RFLAGS=0x00010002 DR7 = 0x0000000000000400 05:20:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001003, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) [ 377.768413] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 377.824480] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 377.871334] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 377.905819] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:20:02 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x12, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:20:02 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) dup(0xffffffffffffffff) prctl$PR_GET_SECCOMP(0x15) ioctl$KDSETLED(r0, 0x4b32, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 377.933654] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 377.951406] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 378.012925] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 378.032979] overlayfs: filesystem on './file0' not supported as upperdir [ 378.045187] GDTR: limit=0x00000000, base=0x0000000000000000 05:20:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, 0x0, 0x0, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:20:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_icize'}}], [], 0x1000000}) 05:20:02 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x1caaa1a600000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 378.069835] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 378.082192] IDTR: limit=0x00000000, base=0x0000000000000000 [ 378.092000] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 378.115796] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 378.131229] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 378.144740] Interruptibility = 00000000 ActivityState = 00000000 [ 378.174292] *** Host State *** [ 378.177531] RIP = 0xffffffff811f8d10 RSP = 0xffff88804dcdf590 [ 378.177554] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 378.193320] FSBase=00007fd733fc1700 GSBase=ffff8880ae700000 TRBase=fffffe0000003000 [ 378.204214] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 378.212605] CR0=0000000080050033 CR3=00000000a7b0b000 CR4=00000000001426e0 [ 378.256501] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 378.277082] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 378.354031] *** Control State *** [ 378.366998] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 378.395154] EntryControls=0000d1ff ExitControls=002fefff [ 378.411892] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 378.422670] VMEntry: intr_info=80000306 errcode=00000000 ilen=00000000 [ 378.443302] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 378.458306] reason=80000021 qualification=0000000000000000 [ 378.487380] IDTVectoring: info=00000000 errcode=00000000 [ 378.504545] TSC Offset = 0xffffff33e06ea071 [ 378.520648] EPT pointer = 0x000000009408a01e 05:20:03 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$mouse(0x0, 0x0, 0x0) getsockopt$TIPC_IMPORTANCE(r2, 0x10f, 0x7f, &(0x7f0000000000), &(0x7f00000000c0)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0xffffffffffffffff, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) write$P9_RSETATTR(r5, &(0x7f0000000100)={0x7, 0x1b, 0x2}, 0x7) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r4, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:20:03 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_i-ize'}}], [], 0x1000000}) 05:20:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x1000000, &(0x7f0000000180)={[{@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0x20}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x24000000}}, {@mode={'mode', 0x3d, 0x7fff}}, {@mode={'mode', 0x3d, 0x1}}], [{@dont_appraise='dont_appraise'}]}) 05:20:03 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x9000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:20:03 executing program 4: statfs(&(0x7f0000000200)='./file0\x00', &(0x7f0000000140)=""/163) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffffffffffda4, 0x0, 0x2880030, &(0x7f0000000100)=ANY=[@ANYBLOB='[ournal_peth=.']) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001640)={{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000001740)=0xe8) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000001980)='/dev/mISDNtimer\x00', 0x20000, 0x0) fsync(r1) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001780)={0x0, 0x0}, &(0x7f00000017c0)=0xc) lsetxattr$security_capability(&(0x7f0000001a00)='./file0\x00', &(0x7f0000001a40)='security.capability\x00', &(0x7f0000001a80)=@v3={0x3000000, [{0x2, 0x7}, {0x100, 0x7}], r0}, 0x18, 0x1) lstat(&(0x7f0000001800)='./file1\x00', &(0x7f0000001840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x6, 0x5, &(0x7f00000015c0)=[{&(0x7f0000000300)="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", 0xff, 0x100000001}, {&(0x7f0000000400)="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", 0x1000, 0x7ff}, {&(0x7f0000001400)="415d849b86c3b13c4cba5ca3a83334ab26cebee73792a30db9775aef7154efc67023", 0x22, 0x9}, {&(0x7f0000001440)="b7eeec21e2238c96fbcd1792d822d82d39e650263b580226770f2ce1ddf7d362df71ee38c59319f3e579e843c0d4738edceaec7d47619f5e566de4a5230b84655527", 0x42, 0xee9}, {&(0x7f00000014c0)="bf798c0e4f338432cdc71fa03722959c3ad3029cf10bfee880e331c8fb2585d8e21ca272b0bb033377c4971d0f1f6753b7f4a0bfa8720df0379383ee5ea3e3a0ee948ab3e9c631434a103bfbe5b46f1a65dbd03da04d75eacfd0f8ef008c6dc1f5f63aea1e82a930a27d965f2c982a06d5dc856ae55b5c1ca636ea233d99b4259599c1dcc3216b09c792f9ca56c55db2d28ba4ccb4b390ef8fdef233dd5d3af9b4b1d35680e8d97ebb17373cae78a1bbc7a422fd197108eed52f3d256c244f10083221ba8dc206b217ee80b433f89bbc0be046297a906e33a1dcd481e5f83a23bd211b1f5c49", 0xe6, 0x45}], 0x800, &(0x7f00000018c0)=ANY=[@ANYBLOB='show_sys_files=yes,mask=MAY_WRITE,euid=', @ANYRESDEC=r0, @ANYBLOB=',uid<', @ANYRESDEC=r3, @ANYBLOB=',pcr=00000000000000000058,euid=', @ANYRESDEC=r4, @ANYBLOB="2c7375626a5f726ffa78c8c4159c2265c6b476526c653d2f6465762f6175646b6f00f5261454"]) r6 = creat(&(0x7f00000002c0)='./file0\x00', 0x8000000000000040) setsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000001ac0)={r2, r4, r5}, 0xc) r7 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x480, 0x0) fcntl$getflags(r7, 0x0) 05:20:03 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x2010, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:20:03 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) dup(0xffffffffffffffff) prctl$PR_GET_SECCOMP(0x15) ioctl$KDSETLED(r0, 0x4b32, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 378.898933] *** Guest State *** [ 378.909883] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 378.954072] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 05:20:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x101000, 0x0) write$P9_RSTATFS(r0, &(0x7f0000000140)={0x43, 0x9, 0x1, {0x8001, 0xfffffffffffff8be, 0x100000001, 0x2, 0x3, 0x6, 0x1, 0x1, 0x1000}}, 0x43) [ 378.998940] CR3 = 0x0000000000000000 [ 379.007936] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 379.026594] RFLAGS=0x00010002 DR7 = 0x0000000000000400 [ 379.032727] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 379.039545] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:20:03 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_iuize'}}], [], 0x1000000}) [ 379.062931] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 379.116300] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 379.125282] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 379.146537] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 379.158510] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 379.170138] GDTR: limit=0x00000000, base=0x0000000000000000 [ 379.202360] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:20:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:20:04 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x11cff, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 379.218207] IDTR: limit=0x00000000, base=0x0000000000000000 [ 379.254260] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 379.320490] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 379.335211] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 379.344120] Interruptibility = 00000000 ActivityState = 00000000 [ 379.358047] *** Host State *** 05:20:04 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x400000000000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 379.369797] RIP = 0xffffffff811f8d10 RSP = 0xffff888054c47590 [ 379.381535] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 379.389681] FSBase=00007fd733fc1700 GSBase=ffff8880ae700000 TRBase=fffffe0000003000 [ 379.414211] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 379.435107] CR0=0000000080050033 CR3=000000008fef5000 CR4=00000000001426e0 [ 379.484509] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 379.499856] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 379.551694] *** Control State *** [ 379.609030] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 379.646222] EntryControls=0000d1ff ExitControls=002fefff [ 379.683647] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 379.737241] VMEntry: intr_info=80000306 errcode=00000000 ilen=00000000 [ 379.813860] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 379.859364] reason=80000021 qualification=0000000000000000 [ 379.898088] IDTVectoring: info=00000000 errcode=00000000 [ 379.920361] TSC Offset = 0xffffff3309d321c0 [ 379.937542] EPT pointer = 0x000000008e82301e 05:20:04 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000000)=0xe8) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:20:04 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x804, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:20:04 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_i%ize'}}], [], 0x1000000}) 05:20:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x101, 0x400100) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000001c0)={@ax25={{0x3, @default}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default]}, {&(0x7f0000000140)=""/7, 0x7}, &(0x7f0000000180), 0x10}, 0xa0) 05:20:04 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') dup(0xffffffffffffffff) prctl$PR_GET_SECCOMP(0x15) ioctl$KDSETLED(r0, 0x4b32, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 380.073695] EXT4-fs: 21 callbacks suppressed [ 380.073703] EXT4-fs (sda1): Cannot specify journal on remount [ 380.111253] overlayfs: filesystem on './file0' not supported as upperdir [ 380.145245] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i%ize=0x0000000000000000" or missing value 05:20:05 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xd, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 380.211381] *** Guest State *** [ 380.224589] EXT4-fs (sda1): Cannot specify journal on remount [ 380.238718] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 05:20:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) [ 380.288279] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 380.310701] CR3 = 0x0000000000000000 05:20:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_ioize'}}], [], 0x1000000}) [ 380.346489] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 05:20:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x6a0c2, 0x0) ioctl$VIDIOC_G_OUTPUT(r0, 0x8004562e, &(0x7f0000000140)) [ 380.412348] RFLAGS=0x00010002 DR7 = 0x0000000000000400 [ 380.461634] overlayfs: filesystem on './file0' not supported as upperdir [ 380.462764] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 380.476995] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 380.490713] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 380.509506] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ioize=0x0000000000000000" or missing value [ 380.511440] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:20:05 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x4000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 380.603367] EXT4-fs (sda1): Cannot specify journal on remount [ 380.627814] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 380.656516] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ioize=0x0000000000000000" or missing value [ 380.702974] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 380.712036] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 380.724065] GDTR: limit=0x00000000, base=0x0000000000000000 [ 380.742489] overlayfs: filesystem on './file0' not supported as upperdir [ 380.746700] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 380.783832] IDTR: limit=0x00000000, base=0x0000000000000000 05:20:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_i0ize'}}], [], 0x1000000}) 05:20:05 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x1400000000000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 380.827504] EXT4-fs (sda1): Cannot specify journal on remount [ 380.885826] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 380.940857] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 380.994367] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 381.008587] Interruptibility = 00000000 ActivityState = 00000000 [ 381.018054] *** Host State *** [ 381.021435] RIP = 0xffffffff811f8d10 RSP = 0xffff88804f84f590 [ 381.043780] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 381.052691] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i0ize=0x0000000000000000" or missing value [ 381.083038] FSBase=00007fd733fc1700 GSBase=ffff8880ae700000 TRBase=fffffe0000003000 [ 381.108066] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 381.120601] CR0=0000000080050033 CR3=0000000092ba6000 CR4=00000000001426e0 [ 381.170933] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 381.178751] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i0ize=0x0000000000000000" or missing value [ 381.219065] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 381.237574] *** Control State *** [ 381.241148] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 381.252019] EntryControls=0000d1ff ExitControls=002fefff [ 381.260568] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 381.286978] VMEntry: intr_info=80000306 errcode=00000000 ilen=00000000 [ 381.310605] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 381.319270] reason=80000021 qualification=0000000000000000 [ 381.326005] IDTVectoring: info=00000000 errcode=00000000 [ 381.331569] TSC Offset = 0xffffff325402e664 [ 381.336052] EPT pointer = 0x000000008e25501e 05:20:06 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f00000000c0)="47da044fb9800000c00f3235000400000f300f01c8666441dd54960066baf80cb878fa7d81ef66bafc0ced0f07c442d18e3bb99b0000400f32660f388102400f32", 0x41}], 0x1, 0x16, 0xfffffffffffffffe, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r4, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:20:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000280)=ANY=[@ANYBLOB="5f00000000000000000000000000f6acb1bf7e5255317ee5d4a662446dec9f4c9d461ec8a5e6f565c59f5727939ce9e6baf8fc8f407a34afa950eebe567fad01a1de732e979286"]) r0 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0xff, 0x40) symlinkat(&(0x7f00000001c0)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00') 05:20:06 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') dup(0xffffffffffffffff) prctl$PR_GET_SECCOMP(0x15) ioctl$KDSETLED(r0, 0x4b32, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 05:20:06 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xff070000000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:20:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_ilize'}}], [], 0x1000000}) 05:20:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(0x0, 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) [ 381.479468] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ilize=0x0000000000000000" or missing value 05:20:06 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x900000000000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 381.611159] *** Guest State *** [ 381.614850] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 381.624201] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 381.633539] CR3 = 0x0000000000000000 [ 381.637602] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 381.643944] RFLAGS=0x00010002 DR7 = 0x0000000000000400 [ 381.650225] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 05:20:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) [ 381.657757] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:20:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_i.ize'}}], [], 0x1000000}) 05:20:06 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x20) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r1, 0x9, 0x70bd25, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x800) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB="010000806e616c5f702174683d2e"]) [ 381.781454] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 381.841835] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:20:06 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x7fffffffffffffff, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 381.910901] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 381.929122] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:20:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) [ 381.954423] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 381.972029] GDTR: limit=0x00000000, base=0x0000000000000000 [ 382.037758] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 382.100385] IDTR: limit=0x00000000, base=0x0000000000000000 [ 382.139465] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 382.213560] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 382.263588] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 382.271234] Interruptibility = 00000000 ActivityState = 00000000 [ 382.278303] *** Host State *** [ 382.281783] RIP = 0xffffffff811f8d10 RSP = 0xffff8880554e7590 [ 382.288509] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 382.315193] FSBase=00007fd733fc1700 GSBase=ffff8880ae600000 TRBase=fffffe0000033000 [ 382.328380] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 382.340501] CR0=0000000080050033 CR3=00000000a63e7000 CR4=00000000001426f0 [ 382.350703] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 382.362902] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 382.381056] *** Control State *** [ 382.384614] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 382.391273] EntryControls=0000d1ff ExitControls=002fefff [ 382.396829] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 382.403796] VMEntry: intr_info=80000306 errcode=00000000 ilen=00000000 [ 382.410478] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 382.417090] reason=80000021 qualification=0000000000000000 [ 382.423467] IDTVectoring: info=00000000 errcode=00000000 [ 382.428914] TSC Offset = 0xffffff31910d7d3d [ 382.433227] EPT pointer = 0x0000000097fcb01e 05:20:07 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$mouse(0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000cc0)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x106}}, 0xfeae) ioctl$PPPIOCGL2TPSTATS(r2, 0x80487436, &(0x7f00000000c0)="634e59a34655f57f50b952f3a574ce61ddb55cce7363df44b67b90fb14de5521c6f42b6a1e9749ad7927d17174cbf246148ce934d92ab5c34fcb63a57539e0f6efc2adc4") write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) r5 = getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) setsockopt$inet_group_source_req(r2, 0x0, 0x2e, &(0x7f0000000480)={0x7, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x22}}}, {{0x2, 0x4e20, @local}}}, 0x108) ioctl$KVM_SET_SREGS(r4, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000200)='./file0/file0\x00', 0x7, 0xa, &(0x7f0000000ac0)=[{&(0x7f0000000240)="c7b9a11b26dcf109e4e5aec58c4f6a867d578e0296c687b7fffe2957abfaf011e0c9d92a212fb09b29fd11e351796d8fa5521ea1441396de114adeaa03", 0x3d, 0x3}, {&(0x7f0000000680)="6c1d5373d3b4016b7ada95c7d8696438a1220baac0231c832b200efdc58bd7d7f0b0f5e14ab21dbc4598f208831efb0b1ba6abda05b84402acd1827a2b3c5b3600b4156131ad78fd993bfac67404b809b90e9a34e89607c936e0eddfbdcc3a035d0544c351cb278fa99d386499fe1c84451d035221d4c230a5afd01821031ad1eb30cfa424c28ea94a74430183a2afd6167b", 0x92, 0x2b}, {&(0x7f00000005c0)="98cd0f0313301ca7713c829131cc591bcacfe6c8185b678338b0429021c6a295092e4c2a62fd452770d50a051545315decdfe8b92444f01ef547a3c21429ff6e76d1c8", 0x43, 0x2}, {&(0x7f0000000280)="991e4a4a4ab6cbb1017e236ef83fda4b4b91a15a3ccb06", 0x17, 0x8}, {&(0x7f0000000740)="2bba8274af5f773c4692ffd5c6373baed299e546b72be9bdb9bf33e04adcf3948b7e2a4597889184c98ccc18b3b3f8fb8f66d6ecb8d30045a3b5af06dc89db381db8d77def1434701f9d033a38f35edea75194a139e289510f316bec62b2aae4cbe5873a2a4b8f9217670c7b3e4fccc206ea5ffdb368bfc6ceeb2c16946d84288918ea45a69c7525e09456c22db3aea30e2bc08ea10e0b672050bd64a6563acd69375ae25fddfaa0804e68c7361ed4d038fe044772d619086f63ef2a2c67", 0xbe, 0x200}, {&(0x7f0000000400)="953a7efcae07175a149bd3b54ebb90d52c72cb350a7f19705a", 0x19, 0x3}, {&(0x7f0000000800)="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", 0xfa, 0xfffffffffffffffe}, {&(0x7f0000000900)="147a0b20fb5b6f45e72f7743eb7f933ef145d73e95e88387598cff29c73178c012ceab53d669546cd9d2b335916dab2862a6fa0d1db445edb83428de8fdd7593ecba575fecc21e8c367a5cd3d2750c410375035d8c0d34c22da8f2cc3c4843546611886532223de0701d19137bfd4634b2ffe34872ad4a73ccdb46e1f77b8f9e203fd3cee3041a6a97a20a2b06d231115d59e080821a48d3ce349992f7d0231825bbf29765ebd314e2a5c1ee4491fe", 0xaf, 0xd9}, {&(0x7f00000009c0)="05be4b0126e93e8d5557288021c06f616a5edda0b12f18", 0x17, 0x3}, {&(0x7f0000000a00)="bc533d3b696fa8d2e2416ac8c7baf1fd69838001d9fcb0d6dd69cd8414e1f472f41f16e4f772ddb68bc60d00c68249dcf629f9ec036da597f4276d7920625bc8c5a7a0ca8e543e8c00e1a6b97bf5126621818ca0fed543cfa0dcaf3cfa1208e133e1129bb38d4e27a82a2510ad1267324f19a307f0b9b4bc4f40c9f73971d046ffaa1d87b698ce44584e0511ef446ed6e42f908a16087a2c74", 0x99, 0x9}], 0x800000, &(0x7f0000000bc0)={[{@fault_injection={'fault_injection', 0x3d, 0xfffffffffffff791}}, {@acl='acl'}, {@acl='acl'}, {@user_xattr='user_xattr'}, {@noacl='noacl'}, {@noacl='noacl'}, {@acl='acl'}], [{@context={'context', 0x3d, 'staff_u'}}, {@fsname={'fsname', 0x3d, '/\'-'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@uid_eq={'uid', 0x3d, r5}}, {@fowner_lt={'fowner<', r5}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x34, 0x74, 0x66, 0x7f, 0x32, 0x0, 0x33], 0x2d, [0x75, 0x35, 0x0, 0x71], 0x2d, [0x0, 0x0, 0x37, 0x61], 0x2d, [0x0, 0x7f], 0x2d, [0x76, 0x39, 0x37, 0x7f, 0x30, 0x77, 0x31, 0x37]}}}]}) 05:20:07 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xa000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:20:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x18000, &(0x7f0000000200)={[{@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x1388000}}, {@mode={'mode', 0x3d, 0x800}}, {@mode={'mode', 0x3d, 0x5dd}}], [{@fowner_gt={'fowner>', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x36, 0x73, 0x3f, 0x0, 0x0, 0x33, 0x7b], 0x2d, [0x63, 0x37, 0x0, 0x32], 0x2d, [0x33, 0x7d, 0x77, 0x77], 0x2d, [0x65, 0x77, 0x73, 0x72], 0x2d, [0x67, 0x0, 0x0, 0x0, 0x64, 0x0, 0x35, 0x37]}}}]}) syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x10001d, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) 05:20:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_idize'}}], [], 0x1000000}) 05:20:07 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') dup(0xffffffffffffffff) prctl$PR_GET_SECCOMP(0x15) ioctl$KDSETLED(r0, 0x4b32, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 05:20:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) [ 382.559770] overlayfs: filesystem on './file0' not supported as upperdir [ 382.644596] *** Guest State *** [ 382.663892] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 05:20:07 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x11000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:20:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x20080) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000380)={0x8000, {{0x2, 0x4e23, @rand_addr=0x2}}, 0x0, 0x4, [{{0x2, 0x4e21, @local}}, {{0x2, 0x4e24, @empty}}, {{0x2, 0x4e23, @remote}}, {{0x2, 0x4e22, @local}}]}, 0x290) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) r1 = getuid() mount$9p_virtio(&(0x7f0000000200)='/dev/vcs#\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x2000000, &(0x7f00000002c0)={'trans=virtio,', {[{@access_uid={'access', 0x3d, r1}}, {@msize={'msize', 0x3d, 0x6}}], [{@dont_hash='dont_hash'}, {@smackfshat={'smackfshat', 0x3d, '/dev/vcs#\x00'}}, {@dont_hash='dont_hash'}, {@obj_role={'obj_role', 0x3d, 'keyring:wlan0g-md5sum\'wlan0^'}}]}}) [ 382.706629] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 05:20:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) [ 382.771946] CR3 = 0x0000000000000000 05:20:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_iXize'}}], [], 0x1000000}) [ 382.798051] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 382.807685] RFLAGS=0x00010002 DR7 = 0x0000000000000400 [ 382.821389] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 382.829268] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 382.846039] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 382.866233] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 382.922256] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 382.946011] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 382.958434] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 382.967695] overlayfs: filesystem on './file0' not supported as upperdir 05:20:07 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x100000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 382.999584] GDTR: limit=0x00000000, base=0x0000000000000000 [ 383.020162] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 383.032702] IDTR: limit=0x00000000, base=0x0000000000000000 [ 383.041501] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 383.050027] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 383.057213] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 383.068266] Interruptibility = 00000000 ActivityState = 00000000 [ 383.075085] *** Host State *** [ 383.079275] RIP = 0xffffffff811f8d10 RSP = 0xffff88804d01f590 [ 383.088999] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 383.158255] FSBase=00007fd733fc1700 GSBase=ffff8880ae700000 TRBase=fffffe0000003000 [ 383.176982] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 383.183360] CR0=0000000080050033 CR3=000000009f0c6000 CR4=00000000001426e0 [ 383.191194] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 05:20:08 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xe4ffffff, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 383.289417] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 383.316681] *** Control State *** [ 383.339655] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 383.394038] EntryControls=0000d1ff ExitControls=002fefff [ 383.424125] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 383.432832] VMEntry: intr_info=80000306 errcode=00000000 ilen=00000000 05:20:08 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') dup(0xffffffffffffffff) prctl$PR_GET_SECCOMP(0x15) ioctl$KDSETLED(r0, 0x4b32, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 05:20:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_iiize'}}], [], 0x1000000}) 05:20:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB="6a6f75726e616c5f7061f4683d2e"]) 05:20:08 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000700)='/dev/kvm\x00', 0x3fffd, 0x0) r3 = shmget$private(0x0, 0x2000, 0x4, &(0x7f0000001000/0x2000)=nil) r4 = geteuid() fstat(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) r7 = getgid() r8 = gettid() r9 = getpgrp(0xffffffffffffffff) shmctl$IPC_SET(r3, 0x1, &(0x7f0000000240)={{0x1, r4, r5, r6, r7, 0x90, 0x9f}, 0x69e, 0x0, 0x5, 0x5d5712e, r8, r9, 0x1}) r10 = syz_open_dev$mouse(0x0, 0x0, 0x0) ioctl$TIOCGSID(r10, 0x5429, &(0x7f0000000400)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r10, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r11, 0x7fff}, 0xc) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r12 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r13 = ioctl$KVM_CREATE_VCPU(r12, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r12, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r13, 0xae80, 0x0) ioctl$SIOCAX25NOUID(r10, 0x89e3, &(0x7f0000000000)=0x1) ioctl$KVM_SET_SREGS(r13, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000680), &(0x7f00000006c0)=0x4) ioctl$KVM_RUN(r13, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:20:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:20:08 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xfffffffe, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 383.444224] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 383.451232] reason=80000021 qualification=0000000000000000 [ 383.458471] IDTVectoring: info=00000000 errcode=00000000 [ 383.470140] TSC Offset = 0xffffff3105ff07a9 [ 383.476292] EPT pointer = 0x00000000a8c7501e 05:20:08 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xa6a1aa1c, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:20:08 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:20:08 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x7ff00, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:20:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x3, 0x4003) getpeername$unix(r0, &(0x7f0000000140)=@abs, &(0x7f00000001c0)=0x6e) 05:20:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:20:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_i\nize'}}], [], 0x1000000}) [ 383.979581] *** Guest State *** [ 383.998026] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 05:20:08 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xff0f000000000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 384.032463] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 384.055888] CR3 = 0x0000000000000000 [ 384.059839] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 384.071918] RFLAGS=0x00010002 DR7 = 0x0000000000000400 [ 384.083221] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 384.112731] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 384.122165] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 384.137698] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 384.152443] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 384.168368] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 384.178746] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 384.216677] GDTR: limit=0x00000000, base=0x0000000000000000 [ 384.254540] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 384.301163] IDTR: limit=0x00000000, base=0x0000000000000000 [ 384.313616] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 384.321853] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 384.342296] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 384.359727] Interruptibility = 00000000 ActivityState = 00000000 [ 384.366661] *** Host State *** [ 384.374460] RIP = 0xffffffff811f8d10 RSP = 0xffff888086b47590 [ 384.381170] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 384.401026] FSBase=00007fd733fc1700 GSBase=ffff8880ae700000 TRBase=fffffe0000003000 [ 384.417161] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 384.430247] CR0=0000000080050033 CR3=000000008d01d000 CR4=00000000001426e0 [ 384.453621] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 05:20:09 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') dup(0xffffffffffffffff) prctl$PR_GET_SECCOMP(0x15) ioctl$KDSETLED(r0, 0x4b32, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 05:20:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:20:09 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x8000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:20:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)=ANY=[@ANYBLOB="6a6f75726e616c5f706174683d2e8009dd8eab6c3c2b537444eb035a28478699db374f6e4393f12435764be367821a1eaf59"]) [ 384.465103] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 384.482521] *** Control State *** [ 384.499176] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 384.520323] EntryControls=0000d1ff ExitControls=002fefff [ 384.527227] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 384.536309] VMEntry: intr_info=80000306 errcode=00000000 ilen=00000000 [ 384.553569] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 05:20:09 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x5c, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 384.566691] reason=80000021 qualification=0000000000000000 [ 384.571756] overlayfs: filesystem on './file0' not supported as upperdir [ 384.579498] IDTVectoring: info=00000000 errcode=00000000 [ 384.585461] TSC Offset = 0xffffff304e215c85 [ 384.589858] EPT pointer = 0x000000008929b01e 05:20:09 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000480)=""/73) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) connect$bt_sco(r5, &(0x7f0000000000)={0x1f, {0x8, 0x5d, 0x81, 0x6, 0xef1, 0x77f}}, 0x8) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000200)="af39bda5c2f1b4bcd4e2846aa46525e3b10a1bb4104ae3d057f7d18b734bba6c4e4fb9526f5d051be632bba2ca6d3447e094b3334089ad3fba5d32494963fac7a78c81d0182c34524e30637af549ff5ee2d7db866f868b9c6fc86a2014a6c98ee680aebb7306a206fcc0ca86daa549eacc6ebee5b9a46ca674b9058c7b4449c1fff356a7ac288d97edad026bfd87a932c04e74a25c1cad60e5bd2c9be40f74b28a3c7d56cff095", 0xa7, 0xfffffffffffffffa) ioctl$KVM_SET_SREGS(r4, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:20:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isiz%'}}], [], 0x1000000}) [ 384.726083] overlayfs: filesystem on './file0' not supported as upperdir 05:20:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getresuid(&(0x7f0000000600)=0x0, &(0x7f0000000640), &(0x7f0000000680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@initdev}}, &(0x7f00000007c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffd, 0x6, &(0x7f0000000540)=[{&(0x7f0000000180)="f70ceb8cafce402305be42b69e4b0e2f160323787d7a69e8e26675c0c07c56ab3dbe824ab0bbb6bcd1cdfc8ea9600db60d2f90d049506bcc602d2fdb784f0b90c466bc147ba30ae08c44149a367754040e1e4ebbc68a47feac669459c379440a8d06c1b13e3084a746e3305913b6421edd2b4a096da2189ce221352d3edc50166901075e5a1e6459f54b7748f4c0c0e4969630ef4d", 0x95, 0x2}, {&(0x7f0000000240)="2bfe34575586834995a3b691d029f164fc7887062ce9e814a1e88143655cbb29d505b4c642f9bb09099a1d0c46e2e4204f3f9cad3fcc8168918dd2418b4c287c2970eb57b8d19febb8ce04efe5efc8ad10c757398f0df46675b754c61d99f8c7442478fc97375605fc99ddd82402988c1122fb", 0x73, 0x6}, {&(0x7f00000002c0)="2d0f191149111395e9a3b9066129b7cbe31d3479c8597c021890c2d21a4a7a5c62af1cb176e96d0f3edcdf4add4582eaa8433408db0f0ebcc400e343fee62a2463419c190e9b34af3f6d25f5a8673928f37c963264724a51907c41a8fcc1d93ce65cadcbe5ef6e099f1e4a3b7248e26f9c3803c09c623a5ca17446df35403a5115b810adb49228b1feb70c8de1ee5d11935a09d7affbe92c44b51e398f79", 0x9e, 0x2}, {&(0x7f0000000380)="81395f1840f3964a249e014f44da8da195fd970c898c11001a29af18b52fa35f4ee6283ba38a97351d428bad0959e128b726224610679aa6b0462c06167348494cf7d0da73007800f0bc9ed6e80d56a8ab22b765a503d029d5e9fead5a80f4f72744fd5094fe6f9ec890592dd87b553d9d855880edfee24ee7c39202328c770db97eb27864732954346929b509485c054f6ddffdfea46ebb595364ff359f5e5f4f568752bb0dcfcfaeb46b4868", 0xad, 0x64}, {&(0x7f0000000440)="486e25e2a311d5e20cf325efa1fcce3bc3f3ac7d90f8b729a95a8e4f7bbfac4eda0cbc994e3bfd65339c14b145ed66da03f3b0e34431a2fc2548ea097db50dd55a48a879a41040c09d3072752e37d2bce0ebcea9879cc29d2a34c1377b7ef56b3e9fb8c6b79e31650fbbe0714ead758b", 0x70, 0x5ab4}, {&(0x7f00000004c0)="0fa70dd13aba8783346b7adb24ed5454b55b7a9c97eae43b53fdbdd63f64ac46c57fd6075ce88da2d83de13c45c9807db1d67da89fbfda3370060af43c64144767e1aa90607fd82f55639bb824a4d2670d71b0", 0x53, 0x4}], 0x440, &(0x7f0000000940)={[{@lazytime='lazytime'}, {@quota='quota'}, {@uqnoenforce='uqnoenforce'}], [{@pcr={'pcr', 0x3d, 0x12}}, {@fowner_lt={'fowner<', r0}}, {@euid_lt={'euid<', r1}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'nodev-+self]'}}, {@uid_gt={'uid>', r2}}]}) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) [ 384.882183] *** Guest State *** [ 384.898166] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 05:20:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[], 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:20:09 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x804000000000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 384.937861] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 384.973357] CR3 = 0x0000000000000000 [ 384.983973] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 384.993839] RFLAGS=0x00010002 DR7 = 0x0000000000000400 [ 385.003816] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 385.011045] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 385.032561] XFS (loop4): unknown mount option [lazytime]. [ 385.050980] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:20:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isiz\n'}}], [], 0x1000000}) 05:20:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4100020, &(0x7f0000000040)=ANY=[]) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x103800, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) sync_file_range(r0, 0xfffffffffffffc01, 0x200, 0x7) [ 385.114899] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 385.157070] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 385.203603] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 385.211635] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 385.245955] GDTR: limit=0x00000000, base=0x0000000000000000 [ 385.260192] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 385.275389] IDTR: limit=0x00000000, base=0x0000000000000000 [ 385.323202] EXT4-fs: 20 callbacks suppressed [ 385.323215] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz [ 385.323215] =0x0000000000000000" or missing value [ 385.340081] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 385.383857] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 385.399937] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 385.409874] Interruptibility = 00000000 ActivityState = 00000000 [ 385.419113] *** Host State *** [ 385.422552] RIP = 0xffffffff811f8d10 RSP = 0xffff88804cc6f590 [ 385.433275] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 385.447879] EXT4-fs (sda1): re-mounted. Opts: [ 385.452922] FSBase=00007fd733fc1700 GSBase=ffff8880ae700000 TRBase=fffffe0000033000 [ 385.478323] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 385.490403] CR0=0000000080050033 CR3=000000008cfd3000 CR4=00000000001426e0 [ 385.499226] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 385.512291] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 05:20:10 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') dup(0xffffffffffffffff) prctl$PR_GET_SECCOMP(0x15) ioctl$KDSETLED(r0, 0x4b32, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 05:20:10 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xb00000000000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:20:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[], 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) [ 385.544287] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz [ 385.544287] =0x0000000000000000" or missing value [ 385.549140] *** Control State *** [ 385.582228] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 05:20:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x2d}}], [], 0x1000000}) [ 385.604423] EXT4-fs (sda1): Unrecognized mount option "/dev/hwrng" or missing value [ 385.623631] EntryControls=0000d1ff ExitControls=002fefff [ 385.641731] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 05:20:10 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xe4ffffff00000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:20:10 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0bffe, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:20:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) [ 385.651717] VMEntry: intr_info=80000306 errcode=00000000 ilen=00000000 [ 385.663220] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 385.670136] reason=80000021 qualification=0000000000000000 [ 385.676948] IDTVectoring: info=00000000 errcode=00000000 [ 385.682688] TSC Offset = 0xffffff2fd362c6bb [ 385.691656] EPT pointer = 0x000000008550901e [ 385.832636] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize-0x0000000000000000" or missing value [ 385.866875] *** Guest State *** [ 385.870211] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 05:20:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[], 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:20:10 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x300000000000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 385.942290] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 385.952143] EXT4-fs (sda1): Cannot specify journal on remount [ 385.967979] CR3 = 0x0000000000000000 [ 385.977704] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 385.988216] RFLAGS=0x00010002 DR7 = 0x0000000000000400 [ 385.999895] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 386.011552] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 386.026552] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 386.063628] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 386.086804] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:20:10 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x1100000000000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 386.124225] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 386.134616] EXT4-fs (sda1): Cannot specify journal on remount [ 386.157674] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:20:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=@random={'system.', '\xe7cgroupwlan0keyring\x00'}) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x2bac2e, 0x0, 0x100020, &(0x7f0000000100)=ANY=[]) [ 386.193254] GDTR: limit=0x00000000, base=0x0000000000000000 [ 386.206288] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 05:20:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3b}}], [], 0x1000000}) [ 386.263786] IDTR: limit=0x00000000, base=0x0000000000000000 [ 386.271983] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 386.314943] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 386.342816] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 386.370173] Interruptibility = 00000000 ActivityState = 00000000 [ 386.384286] *** Host State *** [ 386.387695] RIP = 0xffffffff811f8d10 RSP = 0xffff888098e0f590 [ 386.394231] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 386.400815] FSBase=00007fd733fc1700 GSBase=ffff8880ae700000 TRBase=fffffe0000033000 [ 386.409496] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 386.416276] CR0=0000000080050033 CR3=000000008e823000 CR4=00000000001426e0 [ 386.426970] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 386.435895] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize;0x0000000000000000" or missing value [ 386.472524] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 386.492108] *** Control State *** [ 386.497010] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 386.509743] EntryControls=0000d1ff ExitControls=002fefff [ 386.516160] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 386.523261] VMEntry: intr_info=80000306 errcode=00000000 ilen=00000000 [ 386.536920] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 386.544796] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize;0x0000000000000000" or missing value [ 386.549394] reason=80000021 qualification=0000000000000000 [ 386.579530] IDTVectoring: info=00000000 errcode=00000000 [ 386.592976] TSC Offset = 0xffffff2f505ba065 [ 386.597807] EPT pointer = 0x0000000085d0f01e 05:20:11 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') dup(0xffffffffffffffff) prctl$PR_GET_SECCOMP(0x15) ioctl$KDSETLED(r0, 0x4b32, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 05:20:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB], 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) 05:20:11 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x8212cf7c00000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:20:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_path=.']) clone(0x30010000, &(0x7f0000000140)="5eb79f8bbc182f5f2f6fc2e65671741de7a579baf6b7b7e6773cc3bfe57babb934b8f4f84dbd5c64e422a06da4e8f58b7797bee988716def00a69b8cfc0db28472f3a77631ce659098322432539f78889e881db086ae8bb8a8c0799f5b2372a4a426e14204b3664a001cc0d4e73b6e651f5504460df3e811681e8983e8a23d9b20d1636054d58e17233a2a7a9cf74871b7efddf0433f03a04292bb1b3474a7c42389a6078621e2465e6cb7cccd78c0f50d6ecd9253e1e5ae1d6125d32a083d5fd3e34159e6cb85c7d0cbc134ec9e2a", &(0x7f0000000040), &(0x7f0000000240), &(0x7f0000000280)="bce185f0c2a27d74bef0af1ad18736de91e2efa2115403ef1801b8a0a111f0921e59ddb2679bc563a4d40e1530894affecc7aac89e1c7e822b9e40923f65c194c7212d76c6111a5347d64aa3734a4032df9a8a1ff4e8ecfc7e8349b270fc39dc1aa2e27be6b90da9e00c78c0773687928bc994b763e68230c1f6826b77a32fccae69b9d702ea8a2507a8f6c4d480037e2acf9f6ffb7a") 05:20:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6}}], [], 0x1000000}) 05:20:11 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000200)=0x5) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10004010}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x28, r5, 0x400, 0x70bd2b, 0x25dfdbfc, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x20004800}, 0x4000) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) ioctl$KVM_SET_SREGS(r4, 0x4138ae84, &(0x7f00000002c0)={{}, {0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x400000000}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {0x0, 0x0, 0x8000}}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r6, 0x50, &(0x7f00000000c0)}, 0x10) [ 386.749929] EXT4-fs (sda1): Cannot specify journal on remount 05:20:11 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xff0700, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:20:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB], 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) [ 386.911692] *** Guest State *** [ 386.938215] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 05:20:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='setgroups\x00w\x8e\x00\v|\xcbV\xa2\x1f\xb8\x0e\xac\xac\r]\xa8hN\x9d0\xd7\x1e\x1a\xe9/\xac\xed\x9e\t\xccL\x1bE\x19\x90](\"\x06\x03\xe3\xa3zOx `\xe0\xc0,\xe3v\x86k-\xbfb\xe6\xcd\xb6E\xdfx\xdb\x90E\xa5f\x1e\x16\x97(D8\xca\re\fX\xd3\xe77M\x93\xb0D?\x93\xda\xc0\x06\xef\a\xde\xfc\x11\xd2\x96\x94\xd0\xfc\x83\xb4,Wr\xab\xfb\xa5\x05\x05N\xcb\x88\f9r]\xe1\xcfP\xa9\xe6D5\xce\xb1|7<\xb2\xff\xf9Z\b\xf08\xcc\x19\xc8\x8ft\x0fy\x0f\x97\xdfu\x91\xf1A\x8a\xa2\xa3\vL\xff\x95\x8dh\xca6\x937\xc9A\xed\xfc\x97\xf6B\x92+\xe5u\x9e\x85!`\xe0?P\xa2\x9ar\xb5\xe6\x14\xcd\x1b\xcd:\'\xccJ!Ry\xc0A\x1a\xaa\x01\x02\xba`\x18\xa5\xd8\f\xd7[\xef\x13;z') exit(0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB="6a6f75726e616c5f9981fb2376e0"]) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='security.SMACK64MMAP\x00', &(0x7f0000000280)='&lo!#\x00', 0x6, 0x0) [ 387.015486] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 05:20:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x9}}], [], 0x1000000}) [ 387.090889] CR3 = 0x0000000000000000 [ 387.115809] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 387.155958] RFLAGS=0x00010002 DR7 = 0x0000000000000400 [ 387.194167] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 387.248597] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 387.274516] DS: sel=0x0000, attr=0x10000, limit=0xfffffffd, base=0x0000000000000000 05:20:12 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x1000000000000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:20:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB], 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) [ 387.309474] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 387.365989] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 387.374640] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 387.382853] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 387.391523] GDTR: limit=0x00000000, base=0x0000000000000000 [ 387.436134] LDTR: sel=0x8000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 387.460208] IDTR: limit=0x00000000, base=0x0000000000000000 [ 387.468886] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 387.515751] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 387.548383] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 05:20:12 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b714203fc9465684e75a2807b0a7fa956fec48ecadb85b93784903f6f7db88b99a8ad8424490e4360e6ac6458e465a51f6a61aca6b4b86a02ed01c7df4134c422713198e02"], 0x85) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') dup(0xffffffffffffffff) prctl$PR_GET_SECCOMP(0x15) ioctl$KDSETLED(r0, 0x4b32, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 05:20:12 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xa60bb74b, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 05:20:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5}}], [], 0x1000000}) 05:20:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="0007000000a0aa385b949d5b6c6587dc610000000000000002b0add3852624588c2c2659f54ae057752904c04a4155f0b6a5d678714f732b8b828d8f685ede15b71420"], 0x43) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r2, 0x0, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') r3 = dup(0xffffffffffffffff) ioctl$KDSETLED(r3, 0x4b32, 0xe39f) prctl$PR_GET_SECCOMP(0x15) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=@nat={'nat\x00', 0x1b, 0x5, 0x4c0, 0x348, 0x248, 0x0, 0x248, 0x348, 0x428, 0x428, 0x428, 0x428, 0x428, 0x5, &(0x7f0000000080), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x4, 0x2}}, @common=@unspec=@addrtype1={0x28, 'addrtype\x00', 0x1, {0x100, 0x900, 0x8}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xeb6, [0x2, 0x9, 0x1, 0x3, 0x0, 0x60000000], 0x5, 0x6}, {0x1b5, [0x5, 0x80, 0x4, 0x9, 0x1ff, 0x6], 0x8000, 0x5}}}}, {{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff00, 0xbb377630e18355bf, 'tunl0\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x29, 0x2, 0x10}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x2, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @local, @empty, @port=0x4e20, @port=0x4e20}}}}, {{@ip={@multicast1, @loopback, 0xffffff00, 0xffffffff, 'bridge_slave_0\x00', 'hsr0\x00', {0xff}, {0xff}, 0x89, 0x2, 0xc}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x6, 0x100000000, 0x1}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x12, @empty, @multicast1, @gre_key=0x6, @icmp_id=0x66}}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv6=@loopback, @ipv4=@loopback, @port=0x4e23, @port=0x4e21}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x520) ioctl$KDSETLED(r1, 0x4b32, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) socket$inet6(0xa, 0x1000000000002, 0x0) llistxattr(0x0, &(0x7f00000003c0)=""/215, 0xd7) creat(&(0x7f0000000100)='./file1\x00', 0x0) [ 387.629149] Interruptibility = 00000000 ActivityState = 00000000 [ 387.642501] *** Host State *** [ 387.648158] RIP = 0xffffffff811f8d10 RSP = 0xffff888057a3f590 [ 387.668359] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 387.695382] FSBase=00007fd733fc1700 GSBase=ffff8880ae700000 TRBase=fffffe0000003000 [ 387.713585] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 387.719780] CR0=0000000080050033 CR3=00000000a5c99000 CR4=00000000001426e0 [ 387.731800] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 05:20:12 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x2, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 387.743087] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 387.751726] *** Control State *** [ 387.755728] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 387.762397] EntryControls=0000d1ff ExitControls=002fefff [ 387.769018] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 387.776148] VMEntry: intr_info=80000306 errcode=00000000 ilen=00000000 [ 387.782809] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 387.789476] reason=80000021 qualification=0000000000000000 05:20:12 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$mouse(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r3, 0x4040ae70, &(0x7f0000000000)={0x5, 0x5, 0x3}) getuid() lstat(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000140)='fuseblk\x00', 0xa0c000, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r4, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r4, 0xae80, 0x0) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f00000000c0)=0x5, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 387.795836] IDTVectoring: info=00000000 errcode=00000000 [ 387.801274] TSC Offset = 0xffffff2ebed1a4ab [ 387.806259] EPT pointer = 0x00000000936e201e [ 387.923583] overlayfs: filesystem on './file0' not supported as upperdir 05:20:12 executing program 4: mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x105) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x810, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)=ANY=[@ANYBLOB="5f706174680800299d74ff3a23f18100"]) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x100) 05:20:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6c00}}], [], 0x1000000}) 05:20:12 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xc, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 388.075053] *** Guest State *** [ 388.078391] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 388.229924] ================================================================== [ 388.237589] BUG: KASAN: use-after-free in __ext4_expand_extra_isize+0x16c/0x240 [ 388.245055] Write of size 27643 at addr ffff88807eb5b085 by task syz-executor2/18416 [ 388.252932] [ 388.254570] CPU: 0 PID: 18416 Comm: syz-executor2 Not tainted 4.20.0-rc7-next-20181224 #1 [ 388.262887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 388.272241] Call Trace: [ 388.274842] dump_stack+0x1db/0x2d0 [ 388.278485] ? dump_stack_print_info.cold+0x20/0x20 [ 388.283515] ? __ext4_expand_extra_isize+0x16c/0x240 [ 388.286198] EXT4-fs error (device sda1): ext4_xattr_ibody_find:2188: inode #16769: comm syz-executor1: corrupted in-inode xattr [ 388.288631] ? __ext4_expand_extra_isize+0x16c/0x240 [ 388.288661] print_address_description.cold+0x7c/0x20d [ 388.288674] ? __ext4_expand_extra_isize+0x16c/0x240 [ 388.288690] ? __ext4_expand_extra_isize+0x16c/0x240 [ 388.288708] kasan_report.cold+0x1b/0x40 [ 388.288723] ? __ext4_expand_extra_isize+0x16c/0x240 [ 388.330223] check_memory_region+0x123/0x190 [ 388.334627] memset+0x24/0x40 [ 388.337722] __ext4_expand_extra_isize+0x16c/0x240 [ 388.342643] ext4_mark_inode_dirty+0x827/0xb80 [ 388.347228] ? ext4_expand_extra_isize+0x5c0/0x5c0 [ 388.352150] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 388.357678] ? __ext4_journal_start_sb+0x1af/0x630 [ 388.362606] ? check_preemption_disabled+0x48/0x290 [ 388.367617] ? ext4_journal_abort_handle.isra.0+0x260/0x260 [ 388.373322] ext4_dirty_inode+0x8f/0xc0 [ 388.377284] ? ext4_setattr+0x26f0/0x26f0 [ 388.381422] __mark_inode_dirty+0xab5/0x1590 [ 388.385822] ? __inode_attach_wb+0x13f0/0x13f0 [ 388.390391] ? trace_hardirqs_on+0xbd/0x310 [ 388.394711] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 388.399457] ? trace_hardirqs_off_caller+0x300/0x300 [ 388.404548] ? lockdep_hardirqs_on+0x415/0x5d0 [ 388.409595] ? retint_kernel+0x2d/0x2d [ 388.413475] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 388.418328] ? retint_kernel+0x2d/0x2d [ 388.422208] generic_update_time+0x268/0x440 [ 388.426614] ? file_remove_privs+0x500/0x500 [ 388.431007] ? mnt_clone_write+0xe1/0x160 [ 388.435141] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.440667] ? mnt_clone_write+0x104/0x160 [ 388.444908] ? file_remove_privs+0x500/0x500 [ 388.449304] file_update_time+0x392/0x650 [ 388.453453] ? current_time+0x1b0/0x1b0 [ 388.457422] ? generic_write_check_limits+0x380/0x380 [ 388.462605] ? ext4_file_write_iter+0x292/0x1400 [ 388.467349] __generic_file_write_iter+0x1cf/0x630 [ 388.472271] ext4_file_write_iter+0x381/0x1400 [ 388.476838] ? aa_path_link+0x5d0/0x5d0 [ 388.480809] ? ext4_file_mmap+0x410/0x410 [ 388.484950] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 388.489699] ? lockdep_hardirqs_on+0x415/0x5d0 [ 388.494267] ? retint_kernel+0x2d/0x2d [ 388.498139] ? trace_hardirqs_on_caller+0xc0/0x310 [ 388.503072] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 388.507989] ? common_file_perm+0x231/0x800 [ 388.512299] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 388.517050] do_iter_readv_writev+0x902/0xbc0 [ 388.521535] ? vfs_dedupe_file_range+0x780/0x780 [ 388.526280] ? apparmor_file_permission+0x25/0x30 [ 388.531115] ? rw_verify_area+0x118/0x360 [ 388.535253] do_iter_write+0x184/0x610 [ 388.539134] vfs_iter_write+0x77/0xb0 [ 388.542923] iter_file_splice_write+0x885/0xfc0 [ 388.547600] ? page_cache_pipe_buf_confirm+0x490/0x490 [ 388.552886] ? rw_verify_area+0x118/0x360 [ 388.557027] ? page_cache_pipe_buf_confirm+0x490/0x490 [ 388.562292] direct_splice_actor+0x126/0x1a0 [ 388.566694] splice_direct_to_actor+0x3be/0x9d0 [ 388.571354] ? generic_pipe_buf_nosteal+0x10/0x10 [ 388.576188] ? do_splice_to+0x190/0x190 [ 388.580147] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.585680] ? rw_verify_area+0x118/0x360 [ 388.589818] do_splice_direct+0x2c7/0x420 [ 388.593956] ? splice_direct_to_actor+0x9d0/0x9d0 [ 388.598792] ? rcu_read_lock_sched_held+0x110/0x130 [ 388.603794] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 388.608536] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.614068] ? __sb_start_write+0x1ac/0x360 [ 388.618377] do_sendfile+0x61a/0xe60 [ 388.622087] ? do_compat_pwritev64+0x1c0/0x1c0 [ 388.626665] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 388.632190] ? _copy_from_user+0xdd/0x150 [ 388.636503] __x64_sys_sendfile64+0x15a/0x240 [ 388.640988] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 388.645581] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 388.650157] do_syscall_64+0x1a3/0x800 [ 388.654032] ? syscall_return_slowpath+0x5f0/0x5f0 [ 388.658952] ? prepare_exit_to_usermode+0x232/0x3b0 [ 388.663961] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 388.668798] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 388.673976] RIP: 0033:0x457ec9 [ 388.677163] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 388.696046] RSP: 002b:00007f40766d3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 388.703738] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457ec9 [ 388.710994] RDX: 0000000020000000 RSI: 0000000000000007 RDI: 0000000000000007 [ 388.718250] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 388.725514] R10: 00008080fffffffe R11: 0000000000000246 R12: 00007f40766d46d4 [ 388.732855] R13: 00000000004c4b6b R14: 00000000004d8278 R15: 00000000ffffffff [ 388.740122] [ 388.741731] The buggy address belongs to the page: [ 388.746650] page:ffffea0001fad6c0 count:2 mapcount:0 mapping:ffff8880a6b3b498 index:0x448 [ 388.754951] def_blk_aops [ 388.754960] flags: 0x1fffc000000203a(referenced|dirty|lru|active|private) [ 388.764611] raw: 01fffc000000203a ffffea0001d1fd48 ffffea0001fa1548 ffff8880a6b3b498 [ 388.772483] raw: 0000000000000448 ffff8880485270a8 00000002ffffffff ffff8880563a6180 [ 388.780346] page dumped because: kasan: bad access detected [ 388.786041] page->mem_cgroup:ffff8880563a6180 [ 388.790515] [ 388.792124] Memory state around the buggy address: [ 388.797039] ffff88807eb5bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 388.804384] ffff88807eb5bf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 388.811745] >ffff88807eb5c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 388.819088] ^ [ 388.822438] ffff88807eb5c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 05:20:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) clock_nanosleep(0x4, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x2, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000140)={{0x0, 0x1c9c380}}, &(0x7f0000000180)) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)="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", 0x1000, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f00000013c0)='keyring\x00', &(0x7f0000001400)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$unlink(0x9, r1, r2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0xc) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001480)={&(0x7f0000001440)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x6, 0x0, 0x5, 0x8, 0x0, 0x1fc00, 0x40001, 0x4, 0x80000000, 0x2, 0x10001, 0xf7a, 0x0, 0x5, 0x40, 0x3ff, 0x38, 0x5, 0xfffffffffffffffe, 0x8000, 0x5, 0x5, 0x30b4, 0x6, 0x100, 0x7, 0x5fbb, 0x1, 0xffffffffffffffff, 0x100000000, 0x3eb7d8a7, 0x400000000000000, 0x5, 0x200, 0x3, 0x7, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000200), 0xb}, 0x10, 0x491, 0x2, 0x6, 0x8, 0x0, 0x1000}, r3, 0x4, r0, 0x2) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000014c0)={0x0, r0, 0x0, 0x3}, 0x14) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000040)=ANY=[@ANYBLOB="6a6f977192008d036aa87d117c883cc886616c5f706174fc2c63"]) [ 388.829783] ffff88807eb5c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 388.837123] ================================================================== [ 388.844466] Disabling lock debugging due to kernel taint [ 388.872607] Kernel panic - not syncing: panic_on_warn set ... 05:20:13 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$alg(0x26, 0x5, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) lsetxattr$security_smack_entry(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000280)='vfat\x00', 0x5, 0x2) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x3) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') dup(0xffffffffffffffff) prctl$PR_GET_SECCOMP(0x15) ioctl$KDSETLED(r0, 0x4b32, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 388.878564] CPU: 0 PID: 18416 Comm: syz-executor2 Tainted: G B 4.20.0-rc7-next-20181224 #1 [ 388.887922] EXT4-fs error (device sda1): ext4_xattr_ibody_get:591: inode #16737: comm syz-executor1: corrupted in-inode xattr [ 388.888266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 388.907225] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 388.909036] Call Trace: [ 388.909057] dump_stack+0x1db/0x2d0 [ 388.909072] ? dump_stack_print_info.cold+0x20/0x20 [ 388.920486] CR3 = 0x0000000000000000 [ 388.924078] panic+0x2cb/0x65c [ 388.924093] ? add_taint.cold+0x16/0x16 [ 388.924107] ? __ext4_expand_extra_isize+0x16c/0x240 [ 388.924122] ? preempt_schedule+0x4b/0x60 [ 388.924140] ? ___preempt_schedule+0x16/0x18 [ 388.929297] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 388.932832] ? trace_hardirqs_on+0xb4/0x310 [ 388.932847] ? __ext4_expand_extra_isize+0x16c/0x240 [ 388.932864] end_report+0x47/0x4f [ 388.941333] overlayfs: filesystem on './file0' not supported as upperdir [ 388.945081] ? __ext4_expand_extra_isize+0x16c/0x240 [ 388.945097] kasan_report.cold+0xe/0x40 [ 388.945109] ? __ext4_expand_extra_isize+0x16c/0x240 [ 388.945126] check_memory_region+0x123/0x190 [ 388.949332] RFLAGS=0x00010002 DR7 = 0x0000000000000400 [ 388.953651] memset+0x24/0x40 [ 388.953665] __ext4_expand_extra_isize+0x16c/0x240 [ 388.953683] ext4_mark_inode_dirty+0x827/0xb80 [ 388.953699] ? ext4_expand_extra_isize+0x5c0/0x5c0 [ 388.953715] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 388.953728] ? __ext4_journal_start_sb+0x1af/0x630 [ 388.953747] ? check_preemption_disabled+0x48/0x290 [ 388.976487] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 388.979342] ? ext4_journal_abort_handle.isra.0+0x260/0x260 [ 388.979363] ext4_dirty_inode+0x8f/0xc0 [ 388.985070] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 388.988405] ? ext4_setattr+0x26f0/0x26f0 [ 388.988421] __mark_inode_dirty+0xab5/0x1590 [ 388.988437] ? __inode_attach_wb+0x13f0/0x13f0 [ 388.996053] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 388.997922] ? trace_hardirqs_on+0xbd/0x310 [ 388.997943] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 389.004066] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 389.006975] ? trace_hardirqs_off_caller+0x300/0x300 [ 389.006988] ? lockdep_hardirqs_on+0x415/0x5d0 [ 389.007006] ? retint_kernel+0x2d/0x2d [ 389.011962] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 389.016484] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 389.016501] ? retint_kernel+0x2d/0x2d [ 389.016522] generic_update_time+0x268/0x440 [ 389.016548] ? file_remove_privs+0x500/0x500 [ 389.016564] ? mnt_clone_write+0xe1/0x160 [ 389.023988] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 389.026991] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.027007] ? mnt_clone_write+0x104/0x160 [ 389.031983] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 389.036922] ? file_remove_privs+0x500/0x500 [ 389.036936] file_update_time+0x392/0x650 [ 389.036952] ? current_time+0x1b0/0x1b0 [ 389.036970] ? generic_write_check_limits+0x380/0x380 [ 389.036985] ? ext4_file_write_iter+0x292/0x1400 [ 389.037001] __generic_file_write_iter+0x1cf/0x630 [ 389.046204] GDTR: limit=0x00000000, base=0x0000000000000000 [ 389.049339] ext4_file_write_iter+0x381/0x1400 [ 389.049356] ? aa_path_link+0x5d0/0x5d0 [ 389.053356] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 389.061259] ? ext4_file_mmap+0x410/0x410 [ 389.061279] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 389.061293] ? lockdep_hardirqs_on+0x415/0x5d0 [ 389.061311] ? retint_kernel+0x2d/0x2d [ 389.068147] IDTR: limit=0x00000000, base=0x0000000000000000 [ 389.069826] ? trace_hardirqs_on_caller+0xc0/0x310 [ 389.069846] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 389.074564] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 389.082354] ? common_file_perm+0x231/0x800 [ 389.082370] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 389.082389] do_iter_readv_writev+0x902/0xbc0 [ 389.089159] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 389.091431] ? vfs_dedupe_file_range+0x780/0x780 [ 389.091448] ? apparmor_file_permission+0x25/0x30 [ 389.099533] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 389.104479] ? rw_verify_area+0x118/0x360 [ 389.104495] do_iter_write+0x184/0x610 [ 389.104514] vfs_iter_write+0x77/0xb0 [ 389.104537] iter_file_splice_write+0x885/0xfc0 [ 389.104557] ? page_cache_pipe_buf_confirm+0x490/0x490 [ 389.104579] ? rw_verify_area+0x118/0x360 [ 389.111890] Interruptibility = 00000000 ActivityState = 00000000 [ 389.113012] ? page_cache_pipe_buf_confirm+0x490/0x490 [ 389.113033] direct_splice_actor+0x126/0x1a0 [ 389.121394] *** Host State *** [ 389.125968] splice_direct_to_actor+0x3be/0x9d0 [ 389.125987] ? generic_pipe_buf_nosteal+0x10/0x10 [ 389.126001] ? do_splice_to+0x190/0x190 [ 389.126015] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.126030] ? rw_verify_area+0x118/0x360 [ 389.126044] do_splice_direct+0x2c7/0x420 [ 389.132337] RIP = 0xffffffff811f8d10 RSP = 0xffff8880a7fc7590 [ 389.134305] ? splice_direct_to_actor+0x9d0/0x9d0 [ 389.134326] ? rcu_read_lock_sched_held+0x110/0x130 [ 389.134337] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 389.134352] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.138888] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 389.142872] ? __sb_start_write+0x1ac/0x360 [ 389.142890] do_sendfile+0x61a/0xe60 [ 389.153291] FSBase=00007fd733fa0700 GSBase=ffff8880ae600000 TRBase=fffffe0000033000 [ 389.156377] ? do_compat_pwritev64+0x1c0/0x1c0 [ 389.156396] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 389.156414] ? _copy_from_user+0xdd/0x150 [ 389.160732] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 389.168580] __x64_sys_sendfile64+0x15a/0x240 [ 389.168596] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 389.168615] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 389.168636] do_syscall_64+0x1a3/0x800 [ 389.168652] ? syscall_return_slowpath+0x5f0/0x5f0 [ 389.177679] CR0=0000000080050033 CR3=0000000091419000 CR4=00000000001426f0 [ 389.181154] ? prepare_exit_to_usermode+0x232/0x3b0 [ 389.181172] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 389.186630] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 389.191085] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 389.191097] RIP: 0033:0x457ec9 [ 389.198628] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 389.203959] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 389.203967] RSP: 002b:00007f40766d3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 389.203980] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457ec9 [ 389.203988] RDX: 0000000020000000 RSI: 0000000000000007 RDI: 0000000000000007 [ 389.203994] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 389.204005] R10: 00008080fffffffe R11: 0000000000000246 R12: 00007f40766d46d4 [ 389.208906] *** Control State *** [ 389.212526] R13: 00000000004c4b6b R14: 00000000004d8278 R15: 00000000ffffffff [ 389.221799] Kernel Offset: disabled [ 389.571857] Rebooting in 86400 seconds..