2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x0, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:06 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:06 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x0, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:06 executing program 5: keyctl$search(0xa, 0x0, &(0x7f0000000380)='logon\x00', 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c64, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) keyctl$set_timeout(0xf, 0x0, 0x0) [ 1709.605192][T25352] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:06 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x0, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:06 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x0, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:07 executing program 5: keyctl$search(0xa, 0x0, &(0x7f0000000380)='logon\x00', 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c64, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:07 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:07 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x0, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:07 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:07 executing program 5: keyctl$search(0xa, 0x0, &(0x7f0000000380)='logon\x00', 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c64, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:07 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x0, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:07 executing program 5: keyctl$search(0xa, 0x0, &(0x7f0000000380)='logon\x00', 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) [ 1710.356065][T25633] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:07 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x0, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:07 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x0, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:07 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:07 executing program 5: keyctl$search(0xa, 0x0, &(0x7f0000000380)='logon\x00', 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:07 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x0, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:08 executing program 5: keyctl$search(0xa, 0x0, &(0x7f0000000380)='logon\x00', 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:08 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:08 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x0, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:08 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) [ 1711.055316][T25961] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:08 executing program 5: keyctl$search(0xa, 0x0, &(0x7f0000000380)='logon\x00', 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:08 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x0, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:08 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x0, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:08 executing program 5: keyctl$search(0xa, 0x0, &(0x7f0000000380)='logon\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:08 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:08 executing program 5: keyctl$search(0xa, 0x0, &(0x7f0000000380)='logon\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:08 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:08 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x0, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:08 executing program 5: keyctl$search(0xa, 0x0, &(0x7f0000000380)='logon\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:08 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:08 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:08 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x0, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) [ 1711.720107][T26194] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:09 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:09 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:09 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:09 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x0, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:09 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:09 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:09 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:09 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) [ 1712.366371][T26470] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:09 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:09 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:09 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:09 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:09 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:09 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:09 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:09 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:09 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:09 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) [ 1713.006939][T26892] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:10 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:10 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:10 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:10 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:10 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:10 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:10 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:10 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:10 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:10 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:10 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) [ 1713.722678][T27135] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:10 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:11 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:11 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:11 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:11 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:11 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:11 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:11 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:11 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:11 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:11 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:11 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) [ 1714.556768][T27578] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:11 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:11 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:11 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:11 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:11 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:12 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, 0x0, &(0x7f00000000c0)) 15:50:12 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:12 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:12 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:12 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, 0x0, &(0x7f00000000c0)) 15:50:12 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:12 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:12 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, 0x0, &(0x7f00000000c0)) [ 1715.435411][T27926] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:12 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:12 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:12 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), 0x0) 15:50:12 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:12 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), 0x0) 15:50:12 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:13 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:13 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:13 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:13 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), 0x0) 15:50:13 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) [ 1716.224127][T28363] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:13 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:13 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:13 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:13 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:13 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:13 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:13 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:14 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:14 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:14 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) [ 1717.245126][T28763] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:14 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:14 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:14 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:14 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:14 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:15 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:15 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 1718.139538][T29059] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:15 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(0x0, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:15 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:15 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:15 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:15 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:15 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:15 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:15 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, 0x0, &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:15 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) [ 1718.888006][T29463] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:16 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:16 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:16 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:16 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:16 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:16 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:16 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:16 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 1719.715409][T29694] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:17 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:17 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:17 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:17 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:17 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:17 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:17 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:17 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:17 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) [ 1720.455488][T29878] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:17 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:17 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:17 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:17 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:17 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:17 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:17 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:18 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:18 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:18 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:18 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:18 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:18 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) [ 1721.238527][T30138] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:18 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:18 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:18 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:18 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:18 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:19 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:19 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:19 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:19 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, 0x0) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:19 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:19 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:19 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, 0x0) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 1722.237650][T30451] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:19 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:19 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:19 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, 0x0) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:19 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:19 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:19 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:19 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:20 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:20 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) [ 1723.000187][T30737] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:20 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:20 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:20 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:20 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(0x0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:20 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:20 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:20 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:20 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x0]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:20 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(0x0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) [ 1723.728459][T30962] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:20 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:21 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x0]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:21 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:21 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:21 executing program 4: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000580)) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x7) r2 = dup(r1) setsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000380)=ANY=[], 0x0) clone(0x20000, &(0x7f0000000780)="5a2fc8cc07d6bea8294ad6c5971d32afa50a0320d6d45a3824c5dbed8bd5bb845f24dff08c3c01463c6af6b8dfbb910ebb1c8bc1e5c63001599b44151e687af97cb2f022e01ecc4e5ebbdb1bfa0b2cd2c9ccbd15a06a642db8b66fc6ee2da74a805996262ca111a67f01b7fc848505590d648695bbd674717a1367634dd7c72268ba39b0433bda45b4e31820792a3470515d05351c48dd21d6791165c90de20ce974eb11f0457639e2af4d29d82676d447ab18d5", 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000002, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r2, 0x0) r3 = socket$packet(0x11, 0x100000002, 0x300) socket$packet(0x11, 0xfffffffffffffff4, 0x300) socket$packet(0x11, 0x200000000006, 0x300) r4 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r4) close(r3) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000001c0)={'t\x83am0 \x00', 0x4004}) r6 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) syslog(0xffffffff, &(0x7f0000000880)=""/4096, 0x1000) write$binfmt_elf64(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x119) ioctl$TIOCLINUX7(r2, 0x541c, &(0x7f0000000100)={0x7, 0x7}) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, &(0x7f0000000080)={0x5, 0x3, 0x7, 0x20, 0x7ff, 0xa2}) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x2401, 0x8) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x17) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000006c0)=ANY=[@ANYRESDEC, @ANYRES16=r7, @ANYRES16=r0, @ANYRESHEX=r6, @ANYRESOCT=0x0, @ANYPTR64, @ANYRESHEX=r6]) memfd_create(&(0x7f0000000500)='$&vmnet1\x00', 0x8000000001000004) fallocate(r5, 0x0, 0x0, 0xfffe) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) sched_setaffinity(r4, 0xffffffa3, 0x0) 15:50:21 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x0]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:21 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x100000001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:21 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(0x0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) [ 1724.271307][T31187] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:21 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:21 executing program 4: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000580)) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x7) r2 = dup(r1) setsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000380)=ANY=[], 0x0) clone(0x20000, &(0x7f0000000780)="5a2fc8cc07d6bea8294ad6c5971d32afa50a0320d6d45a3824c5dbed8bd5bb845f24dff08c3c01463c6af6b8dfbb910ebb1c8bc1e5c63001599b44151e687af97cb2f022e01ecc4e5ebbdb1bfa0b2cd2c9ccbd15a06a642db8b66fc6ee2da74a805996262ca111a67f01b7fc848505590d648695bbd674717a1367634dd7c72268ba39b0433bda45b4e31820792a3470515d05351c48dd21d6791165c90de20ce974eb11f0457639e2af4d29d82676d447ab18d5", 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000002, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r2, 0x0) r3 = socket$packet(0x11, 0x100000002, 0x300) socket$packet(0x11, 0xfffffffffffffff4, 0x300) socket$packet(0x11, 0x200000000006, 0x300) r4 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r4) close(r3) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000001c0)={'t\x83am0 \x00', 0x4004}) r6 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) syslog(0xffffffff, &(0x7f0000000880)=""/4096, 0x1000) write$binfmt_elf64(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x119) ioctl$TIOCLINUX7(r2, 0x541c, &(0x7f0000000100)={0x7, 0x7}) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, &(0x7f0000000080)={0x5, 0x3, 0x7, 0x20, 0x7ff, 0xa2}) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x2401, 0x8) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x17) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000006c0)=ANY=[@ANYRESDEC, @ANYRES16=r7, @ANYRES16=r0, @ANYRESHEX=r6, @ANYRESOCT=0x0, @ANYPTR64, @ANYRESHEX=r6]) memfd_create(&(0x7f0000000500)='$&vmnet1\x00', 0x8000000001000004) fallocate(r5, 0x0, 0x0, 0xfffe) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) sched_setaffinity(r4, 0xffffffa3, 0x0) 15:50:21 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', 0x0, &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:21 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:21 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:21 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x100000001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:21 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:22 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', 0x0, &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:22 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 1725.003464][T31510] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:22 executing program 4: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000580)) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x7) r2 = dup(r1) setsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000380)=ANY=[], 0x0) clone(0x20000, &(0x7f0000000780)="5a2fc8cc07d6bea8294ad6c5971d32afa50a0320d6d45a3824c5dbed8bd5bb845f24dff08c3c01463c6af6b8dfbb910ebb1c8bc1e5c63001599b44151e687af97cb2f022e01ecc4e5ebbdb1bfa0b2cd2c9ccbd15a06a642db8b66fc6ee2da74a805996262ca111a67f01b7fc848505590d648695bbd674717a1367634dd7c72268ba39b0433bda45b4e31820792a3470515d05351c48dd21d6791165c90de20ce974eb11f0457639e2af4d29d82676d447ab18d5", 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000002, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r2, 0x0) r3 = socket$packet(0x11, 0x100000002, 0x300) socket$packet(0x11, 0xfffffffffffffff4, 0x300) socket$packet(0x11, 0x200000000006, 0x300) r4 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r4) close(r3) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000001c0)={'t\x83am0 \x00', 0x4004}) r6 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) syslog(0xffffffff, &(0x7f0000000880)=""/4096, 0x1000) write$binfmt_elf64(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x119) ioctl$TIOCLINUX7(r2, 0x541c, &(0x7f0000000100)={0x7, 0x7}) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, &(0x7f0000000080)={0x5, 0x3, 0x7, 0x20, 0x7ff, 0xa2}) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x200100, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x2401, 0x8) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x17) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000006c0)=ANY=[@ANYRESDEC, @ANYRES16=r7, @ANYRES16=r0, @ANYRESHEX=r6, @ANYRESOCT=0x0, @ANYPTR64, @ANYRESHEX=r6]) memfd_create(&(0x7f0000000500)='$&vmnet1\x00', 0x8000000001000004) fallocate(r5, 0x0, 0x0, 0xfffe) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) sched_setaffinity(r4, 0xffffffa3, 0x0) 15:50:22 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x100000001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:22 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:22 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x100000001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:22 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', 0x0, &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:22 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x100000001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:22 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:22 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x100000001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) [ 1725.743795][T31747] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:23 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x3) dup3(r0, r1, 0x7fffc) 15:50:23 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x100000001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:23 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x100000001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:23 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x100000001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:23 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x100000001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:23 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x3) dup3(r0, r1, 0x7fffc) 15:50:23 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:23 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x100000001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:23 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x100000001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) [ 1726.745365][T32087] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:23 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x3) dup3(r0, r1, 0x7fffc) 15:50:24 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x100000001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:24 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x100000001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:24 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x100000001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:24 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:24 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x0) dup3(r0, r1, 0x7fffc) 15:50:24 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x100000001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) [ 1727.488546][T32274] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:24 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x100000001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:24 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x100000001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:24 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x0) dup3(r0, r1, 0x7fffc) 15:50:24 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x100000001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:25 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x3) dup3(r0, r1, 0x7fffc) 15:50:25 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:25 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x0) dup3(r0, r1, 0x7fffc) 15:50:25 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") [ 1728.297284][T32460] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:25 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x100000001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) [ 1728.518227][T32564] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.5'. 15:50:25 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(0xffffffffffffffff, r0, 0x7fffc) 15:50:25 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x100000001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:26 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x3) dup3(r0, r1, 0x7fffc) 15:50:26 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:26 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x100000001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:26 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x100000001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) [ 1729.195975][ T317] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:26 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(0xffffffffffffffff, r0, 0x7fffc) 15:50:26 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x100000001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:26 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x3) dup3(r0, r1, 0x7fffc) 15:50:26 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x100000001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:26 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(0xffffffffffffffff, r0, 0x7fffc) 15:50:26 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x100000001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:27 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x100000001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:27 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") [ 1730.094981][ T634] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:27 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, 0xffffffffffffffff, 0x7fffc) 15:50:27 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x100000001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:27 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x100000001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:27 executing program 5 (fault-call:2 fault-nth:0): semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:27 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, 0xffffffffffffffff, 0x7fffc) 15:50:27 executing program 0 (fault-call:2 fault-nth:0): r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:27 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:27 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 1730.815505][ T855] FAULT_INJECTION: forcing a failure. [ 1730.815505][ T855] name fail_page_alloc, interval 1, probability 0, space 0, times 0 15:50:27 executing program 3 (fault-call:4 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:28 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x100000001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) [ 1730.891178][ T859] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1730.959685][ T855] CPU: 0 PID: 855 Comm: syz-executor.0 Not tainted 5.2.0-rc3-next-20190604 #8 [ 1730.968605][ T855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1730.978679][ T855] Call Trace: [ 1730.982001][ T855] dump_stack+0x172/0x1f0 [ 1730.986391][ T855] should_fail.cold+0xa/0x15 [ 1730.991008][ T855] ? profile_setup.cold+0xbb/0xbb [ 1730.996076][ T855] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1731.001959][ T855] should_fail_alloc_page+0x50/0x60 [ 1731.007167][ T855] __alloc_pages_nodemask+0x1a1/0x8d0 [ 1731.012563][ T855] ? stack_trace_consume_entry+0x190/0x190 [ 1731.018422][ T855] ? __lock_acquire+0x54f/0x5490 [ 1731.023381][ T855] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1731.029237][ T855] ? is_dynamic_key+0x1c0/0x1c0 [ 1731.034100][ T855] ? save_stack+0x5c/0x90 [ 1731.038454][ T855] ? save_stack+0x23/0x90 [ 1731.042801][ T855] ? __kasan_slab_free+0x102/0x150 [ 1731.047930][ T855] ? kasan_slab_free+0xe/0x10 [ 1731.052628][ T855] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1731.058890][ T855] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1731.065331][ T855] alloc_pages_vma+0x39a/0x540 [ 1731.070132][ T855] do_huge_pmd_anonymous_page+0x509/0x1660 [ 1731.075969][ T855] ? __lock_acquire+0x54f/0x5490 [ 1731.080966][ T855] ? prep_transhuge_page+0xa0/0xa0 [ 1731.086094][ T855] ? pmd_val+0x100/0x100 [ 1731.090368][ T855] __handle_mm_fault+0x2d59/0x3eb0 [ 1731.095503][ T855] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1731.101059][ T855] ? find_held_lock+0x35/0x130 [ 1731.105897][ T855] ? handle_mm_fault+0x292/0xa90 [ 1731.110877][ T855] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1731.117237][ T855] ? kasan_check_read+0x11/0x20 [ 1731.122118][ T855] handle_mm_fault+0x3b7/0xa90 [ 1731.126890][ T855] __do_page_fault+0x5ef/0xda0 [ 1731.131661][ T855] do_page_fault+0x71/0x57d [ 1731.136183][ T855] page_fault+0x1e/0x30 [ 1731.140365][ T855] RIP: 0010:copy_user_generic_unrolled+0x89/0xc0 15:50:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 1731.146701][ T855] Code: 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 <4c> 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a [ 1731.166315][ T855] RSP: 0018:ffff888091fef998 EFLAGS: 00010202 [ 1731.172390][ T855] RAX: ffffed10123fdf64 RBX: 0000000000000020 RCX: 0000000000000004 [ 1731.180367][ T855] RDX: 0000000000000000 RSI: ffff888091fefb00 RDI: 0000000020b67000 [ 1731.188351][ T855] RBP: ffff888091fef9d0 R08: 0000000000000000 R09: ffffed10123fdf64 [ 1731.196335][ T855] R10: ffffed10123fdf63 R11: ffff888091fefb1f R12: 0000000020b67000 [ 1731.204317][ T855] R13: ffff888091fefb00 R14: 0000000020b67020 R15: 00007ffffffff000 [ 1731.212330][ T855] ? _copy_to_user+0x146/0x160 [ 1731.217125][ T855] do_ipv6_getsockopt.isra.0+0x93c/0x2590 [ 1731.222858][ T855] ? copy_overflow+0x30/0x30 [ 1731.227459][ T855] ? mark_held_locks+0xf0/0xf0 [ 1731.227539][ T855] ? __lock_acquire+0x54f/0x5490 [ 1731.227557][ T855] ? __lock_acquire+0x54f/0x5490 [ 1731.227574][ T855] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1731.227593][ T855] ? mark_held_locks+0xf0/0xf0 [ 1731.227607][ T855] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1731.227622][ T855] ? aa_label_sk_perm+0x101/0x560 [ 1731.227637][ T855] ? mark_held_locks+0xf0/0xf0 [ 1731.227654][ T855] ? aa_profile_af_perm+0x320/0x320 [ 1731.227673][ T855] ? find_held_lock+0x35/0x130 [ 1731.279219][ T855] ? __fget+0x35a/0x550 [ 1731.283401][ T855] ? lock_downgrade+0x880/0x880 [ 1731.288263][ T855] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1731.294523][ T855] ? kasan_check_read+0x11/0x20 [ 1731.299394][ T855] ipv6_getsockopt+0x186/0x280 [ 1731.304172][ T855] ? ipv6_getsockopt+0x186/0x280 [ 1731.309136][ T855] ? do_ipv6_getsockopt.isra.0+0x2590/0x2590 [ 1731.315133][ T855] ? aa_sk_perm+0x288/0x880 [ 1731.319653][ T855] udpv6_getsockopt+0x68/0xa0 [ 1731.324353][ T855] sock_common_getsockopt+0x94/0xd0 [ 1731.329570][ T855] __sys_getsockopt+0x15f/0x240 [ 1731.334435][ T855] ? kernel_setsockopt+0x1d0/0x1d0 [ 1731.339563][ T855] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1731.345034][ T855] ? do_syscall_64+0x26/0x680 [ 1731.349731][ T855] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1731.355815][ T855] ? do_syscall_64+0x26/0x680 [ 1731.360598][ T855] __x64_sys_getsockopt+0xbe/0x150 [ 1731.365736][ T855] do_syscall_64+0xfd/0x680 [ 1731.370263][ T855] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1731.376168][ T855] RIP: 0033:0x459279 [ 1731.380072][ T855] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1731.399780][ T855] RSP: 002b:00007f4f56200c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 15:50:28 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:28 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, 0xffffffffffffffff, 0x7fffc) 15:50:28 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x3f00, 0x10) [ 1731.408213][ T855] RAX: ffffffffffffffda RBX: 00007f4f56200c90 RCX: 0000000000459279 [ 1731.416210][ T855] RDX: 000000000000003d RSI: 0000000000000029 RDI: 0000000000000003 [ 1731.424196][ T855] RBP: 000000000075bf20 R08: 00000000200000c0 R09: 0000000000000000 [ 1731.432192][ T855] R10: 0000000020b67000 R11: 0000000000000246 R12: 00007f4f562016d4 [ 1731.440449][ T855] R13: 00000000004c0209 R14: 00000000004d1f60 R15: 0000000000000004 15:50:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x2, 0x10) [ 1731.590464][ T981] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:28 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0xff7f, 0x10) 15:50:28 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x100000001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:28 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x0) 15:50:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x2000000, 0x10) 15:50:29 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0xff7f0000, 0x10) 15:50:29 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x0) 15:50:29 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) r2 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_STREAMON(r2, 0x40045612, &(0x7f0000000080)=0x3) [ 1732.263935][ T1218] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:29 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, 0xffffffffffffffff, 0x7fffc) 15:50:29 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0xff7f, 0x10) 15:50:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x200000000000000, 0x10) 15:50:29 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x0) 15:50:29 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) prctl$PR_GET_FP_MODE(0x2e) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x402100, 0x0) sendto$ax25(r1, &(0x7f0000000080)="5859196823dbf72cf2d1e0b278f164dd30127676de39ab6453c3dd6d1c6ba3a5473ae1a86b8d7de806ff5059ada83beb82423821a3f84f1e1915a8a1d6f976bdcb6983de17e98987", 0x48, 0x20000000, &(0x7f0000000100)={{0x3, @default, 0x4}, [@null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}, 0x48) 15:50:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0xff7f000000000000, 0x10) 15:50:29 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, 0xffffffffffffffff, 0x7fffc) 15:50:29 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:29 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, 0xffffffffffffffff, 0x7fffc) 15:50:30 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x100, 0x40) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r2, 0x800, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x5, 0xaab, 0x6, 0x5}}}, ["", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20004004}, 0x1) 15:50:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x2) [ 1733.009236][ T1581] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x3) 15:50:30 executing program 2 (fault-call:13 fault-nth:0): bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:30 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x1000000, 0x10) 15:50:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0xb) 15:50:30 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, 0xffffffffffffffff, 0x7fffc) 15:50:30 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) socket$inet6_udp(0xa, 0x2, 0x0) 15:50:30 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0xf) [ 1733.668073][ T1952] FAULT_INJECTION: forcing a failure. [ 1733.668073][ T1952] name failslab, interval 1, probability 0, space 0, times 0 15:50:30 executing program 0: r0 = socket$inet6(0xa, 0xa, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)=0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000100)=0x0) kcmp(r2, r3, 0x2, r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}, 0x1}) [ 1733.748091][ T2029] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1733.820169][ T1952] CPU: 0 PID: 1952 Comm: syz-executor.2 Not tainted 5.2.0-rc3-next-20190604 #8 [ 1733.829654][ T1952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1733.840260][ T1952] Call Trace: [ 1733.843594][ T1952] dump_stack+0x172/0x1f0 [ 1733.847969][ T1952] should_fail.cold+0xa/0x15 [ 1733.852610][ T1952] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1733.858545][ T1952] ? ___might_sleep+0x163/0x280 [ 1733.863433][ T1952] __should_failslab+0x121/0x190 [ 1733.868398][ T1952] should_failslab+0x9/0x14 [ 1733.873131][ T1952] kmem_cache_alloc+0x2af/0x6f0 [ 1733.878186][ T1952] ? apparmor_capable+0x2ed/0x630 [ 1733.883358][ T1952] ? cap_capable+0x205/0x270 [ 1733.888393][ T1952] getname_flags+0xd6/0x5b0 [ 1733.892996][ T1952] user_path_mountpoint_at+0x29/0x50 [ 1733.898325][ T1952] ksys_umount+0x167/0xf00 [ 1733.903038][ T1952] ? ksys_write+0x1cf/0x290 [ 1733.907705][ T1952] ? __detach_mounts+0x320/0x320 [ 1733.912684][ T1952] ? trace_hardirqs_on_thunk+0x1a/0x1c 15:50:31 executing program 4 (fault-call:0 fault-nth:0): syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') [ 1733.918183][ T1952] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1733.923675][ T1952] ? do_syscall_64+0x26/0x680 [ 1733.928383][ T1952] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1733.934499][ T1952] ? do_syscall_64+0x26/0x680 [ 1733.939346][ T1952] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1733.944686][ T1952] __x64_sys_umount+0x54/0x80 [ 1733.949408][ T1952] do_syscall_64+0xfd/0x680 [ 1733.954212][ T1952] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1733.960330][ T1952] RIP: 0033:0x459279 [ 1733.964282][ T1952] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1733.984262][ T1952] RSP: 002b:00007fc9edae1c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 1733.993041][ T1952] RAX: ffffffffffffffda RBX: 00007fc9edae1c90 RCX: 0000000000459279 [ 1733.993060][ T1952] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000800 [ 1734.011221][ T1952] RBP: 000000000075bfc0 R08: 0000000000000000 R09: 0000000000000000 [ 1734.019412][ T1952] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc9edae26d4 [ 1734.027617][ T1952] R13: 00000000004c84d8 R14: 00000000004dec50 R15: 0000000000000004 15:50:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x11) [ 1734.073299][ T2039] FAULT_INJECTION: forcing a failure. [ 1734.073299][ T2039] name failslab, interval 1, probability 0, space 0, times 0 15:50:31 executing program 2 (fault-call:13 fault-nth:1): bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) [ 1734.168086][ T2039] CPU: 1 PID: 2039 Comm: syz-executor.4 Not tainted 5.2.0-rc3-next-20190604 #8 [ 1734.177365][ T2039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1734.187989][ T2039] Call Trace: [ 1734.191324][ T2039] dump_stack+0x172/0x1f0 [ 1734.196349][ T2039] should_fail.cold+0xa/0x15 [ 1734.201015][ T2039] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1734.206870][ T2039] ? ___might_sleep+0x163/0x280 [ 1734.211760][ T2039] __should_failslab+0x121/0x190 [ 1734.216908][ T2039] should_failslab+0x9/0x14 [ 1734.221610][ T2039] __kmalloc+0x2d9/0x740 [ 1734.226482][ T2039] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1734.232930][ T2039] ? fput_many+0x12c/0x1a0 [ 1734.237378][ T2039] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1734.237392][ T2039] ? strnlen_user+0x1ed/0x2e0 [ 1734.237406][ T2039] ? __x64_sys_memfd_create+0x13c/0x470 [ 1734.237424][ T2039] __x64_sys_memfd_create+0x13c/0x470 [ 1734.237440][ T2039] ? memfd_fcntl+0x1820/0x1820 [ 1734.237454][ T2039] ? do_syscall_64+0x26/0x680 [ 1734.237476][ T2039] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1734.275116][ T2039] ? trace_hardirqs_on+0x67/0x220 [ 1734.280178][ T2039] do_syscall_64+0xfd/0x680 [ 1734.285104][ T2039] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1734.291398][ T2039] RIP: 0033:0x459279 [ 1734.295426][ T2039] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:50:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x12) [ 1734.315443][ T2039] RSP: 002b:00007f967103d9f8 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1734.324383][ T2039] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459279 [ 1734.332462][ T2039] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bdeb6 [ 1734.341330][ T2039] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 0000000000000000 [ 1734.349842][ T2039] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f967103e6d4 [ 1734.358144][ T2039] R13: 00000000004bdeb6 R14: 00000000004dea88 R15: 0000000000000003 15:50:31 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x3f000000, 0x10) 15:50:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x13) 15:50:31 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) fanotify_init(0x2, 0x401) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x105640, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000100)={r2, 0x3}) 15:50:31 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:31 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) recvmsg(r0, &(0x7f0000000540)={&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000100)=""/201, 0xc9}, {&(0x7f0000000200)=""/49, 0x31}, {&(0x7f0000000240)=""/150, 0x96}, {&(0x7f0000000300)=""/209, 0xd1}, {&(0x7f0000000400)=""/11, 0xb}, {&(0x7f0000000440)=""/81, 0x51}], 0x6}, 0x2000) setsockopt$inet_mreq(r1, 0x0, 0x23, &(0x7f0000000600)={@multicast2, @remote}, 0x8) r2 = accept4$tipc(r1, &(0x7f0000000580)=@id, &(0x7f00000005c0)=0x10, 0x800) socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup3(r2, r0, 0x80000) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000680)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000000780)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x76a1b080}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)=ANY=[@ANYBLOB='Y\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="080026bd7000fedbdf25010000000000000007410000004c00180000000473797a30000000feffffffffffffff0000000000000000000000000000000000000000001000"/98], 0x68}, 0x1, 0x0, 0x0, 0x4000800}, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x68b1) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x14) [ 1734.683223][ T2370] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1734.838385][ T2266] FAULT_INJECTION: forcing a failure. [ 1734.838385][ T2266] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1734.852280][ T2266] CPU: 1 PID: 2266 Comm: syz-executor.2 Not tainted 5.2.0-rc3-next-20190604 #8 [ 1734.861933][ T2266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1734.872513][ T2266] Call Trace: [ 1734.875936][ T2266] dump_stack+0x172/0x1f0 [ 1734.880481][ T2266] should_fail.cold+0xa/0x15 [ 1734.885204][ T2266] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1734.885227][ T2266] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1734.885252][ T2266] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1734.903820][ T2266] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1734.903839][ T2266] should_fail_alloc_page+0x50/0x60 [ 1734.903855][ T2266] __alloc_pages_nodemask+0x1a1/0x8d0 [ 1734.903872][ T2266] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1734.903889][ T2266] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1734.903917][ T2266] cache_grow_begin+0x9d/0x650 [ 1734.941974][ T2266] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1734.950637][ T2266] kmem_cache_alloc+0x628/0x6f0 [ 1734.956310][ T2266] getname_flags+0xd6/0x5b0 [ 1734.961117][ T2266] user_path_mountpoint_at+0x29/0x50 [ 1734.967590][ T2266] ksys_umount+0x167/0xf00 [ 1734.972518][ T2266] ? ksys_write+0x1cf/0x290 [ 1734.978087][ T2266] ? __detach_mounts+0x320/0x320 [ 1734.984726][ T2266] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1734.991126][ T2266] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1734.997675][ T2266] ? do_syscall_64+0x26/0x680 [ 1735.002940][ T2266] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1735.009206][ T2266] ? do_syscall_64+0x26/0x680 [ 1735.014107][ T2266] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1735.020082][ T2266] __x64_sys_umount+0x54/0x80 [ 1735.024798][ T2266] do_syscall_64+0xfd/0x680 [ 1735.024819][ T2266] entry_SYSCALL_64_after_hwframe+0x49/0xbe 15:50:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = semget(0x1, 0x4, 0x2) semctl$SETALL(r1, 0x0, 0x11, &(0x7f00000000c0)) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:32 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') [ 1735.024839][ T2266] RIP: 0033:0x459279 [ 1735.035980][ T2266] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1735.035990][ T2266] RSP: 002b:00007fc9edb02c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 1735.036004][ T2266] RAX: ffffffffffffffda RBX: 00007fc9edb02c90 RCX: 0000000000459279 [ 1735.036013][ T2266] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000800 15:50:32 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x9c002, 0x100) ioctl$TIOCGICOUNT(r1, 0x545d, 0x0) socket$tipc(0x1e, 0x2, 0x0) openat$cgroup_procs(r1, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000000140), &(0x7f00000000c0)=0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000100)=0xffffffffffffffff, 0xffffffffffffff63) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) [ 1735.036020][ T2266] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1735.036027][ T2266] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc9edb036d4 [ 1735.036036][ T2266] R13: 00000000004c84d8 R14: 00000000004dec50 R15: 0000000000000004 15:50:32 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:32 executing program 2 (fault-call:13 fault-nth:2): bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") openat$vimc2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video2\x00', 0x2, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r1 = semget(0x0, 0x0, 0x401) semop(r1, &(0x7f0000000000), 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r2, 0xc040564a, &(0x7f00000000c0)={0x27, 0x0, 0x3016, 0x6, 0x9, 0x7f, 0x5, 0x1}) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 1735.263463][ T2633] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:32 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0xff7f0000, 0x10) 15:50:32 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:32 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000040)=""/18) 15:50:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x4000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@mcast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) bind$bt_hci(r1, &(0x7f00000002c0)={0x1f, r2, 0x3}, 0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r3, &(0x7f00000017c0), 0x1a1, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:32 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:32 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000080), &(0x7f0000000100)=0x4) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:32 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0xf9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100)={r1, 0x98}, 0x8) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x4280c1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000f80200000801000000000000000000000801000008010000280200002802000028020000280200002802000003000000", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000400"/48], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800080100000000000000000000000000000000000000000000000040004c4f4700000000000000000000000000000000000000000000000000000001043224ddcd46992dab4a7036d9162f53d4e5d7c346c7d5242ca25db13aacb200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f00020010000000000000000000000000000000000000000000000002800727066696c7465720000000000000000000000000000000000000000000003000000000000003000434f4e4e4d41524b000000000000000000000000000000000000000000010500000009000000f7ffffff010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x358) 15:50:33 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:33 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x220002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80000, 0x0) getsockopt$XDP_STATISTICS(r2, 0x11b, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x18) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) ioctl$VIDIOC_S_DV_TIMINGS(r2, 0xc0845657, &(0x7f00000001c0)={0x0, @bt={0x9, 0xfffffffffffffe00, 0x0, 0x3, 0x60f2d750, 0x2629, 0x3, 0x8, 0x5, 0xffffffffffffff80, 0x9, 0xc8cb, 0x1, 0xffffffff, 0x2, 0x1}}) 15:50:33 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x9, &(0x7f0000000100), &(0x7f00000000c0)=0x4) 15:50:33 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x2) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) [ 1736.011734][ T3104] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:33 executing program 4: syz_read_part_table(0x0, 0xff44, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') init_module(&(0x7f0000000000)='md5sumtrusted/^procuser\x00', 0x18, &(0x7f0000000040)='#\\}e\x00') 15:50:33 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x100000000000000, 0x10) 15:50:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = semget$private(0x0, 0x2, 0x200) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8d, 0x100) setns(r2, 0x18000000) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000140)=[0x6b4c, 0x3f, 0x31106197, 0xfffffffffffffff8, 0x1000, 0x3]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:33 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:33 executing program 4: syz_read_part_table(0x5, 0x3d11, 0x0) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') 15:50:33 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) accept$inet(r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x200400, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x3}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000200)=ANY=[@ANYRES32=r2, @ANYBLOB="53000000a2e469a4a78325130e30668f7f91468ea5ef9351b89d378da06b24b9c3ce55961a522af68fade7eebc05007dcb5beb902cae33add733ab715f1ef81599acbf984caafe961bdc1b650a0731535fdb992acf494746b260a8e80eca8d12c401b965a6c451f3e4768acadf9eeee59a804aea3f399bb6beb5260ac69152c14cdbd70bf47a3e2062008286c5a71766f08d36835a26f402b838a2044d1ab311a220b560e44402"], &(0x7f00000001c0)=0x5b) socket$inet6_sctp(0xa, 0x1, 0x84) semget$private(0x0, 0x5, 0x0) r3 = semget(0x3, 0x1, 0x8) semget$private(0x0, 0x3, 0x400) semctl$IPC_RMID(r3, 0x0, 0x10) 15:50:33 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:33 executing program 4: syz_read_part_table(0x1000000000000ab, 0x0, 0x0) io_setup(0x80000008e, &(0x7f0000000000)=0x0) io_getevents(r0, 0x9, 0x80001b1, &(0x7f0000000040)=[{}, {}, {}], &(0x7f00000000c0)={0x0, 0x1c9c380}) 15:50:33 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x3f00000000000000, 0x10) 15:50:33 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x4000) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:33 executing program 3: r0 = semget$private(0x0, 0x0, 0xa) syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x729880) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x100, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ubi_ctrl\x00', 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000280)={r2}) setsockopt$inet_mreq(r3, 0x0, 0x20, &(0x7f00000000c0)={@multicast2, @multicast2}, 0x8) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)=[0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) r5 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$restrict_keyring(0x1d, r5, &(0x7f0000000180)='encrypted\x00', &(0x7f00000001c0)='(.eth1system!\x00') [ 1736.758696][ T3396] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:34 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) r1 = dup3(r0, r0, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000240)=""/207) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000080)=0x8) ioctl$SIOCX25GSUBSCRIP(r1, 0x89e0, &(0x7f0000000140)={'bond0\x00', 0x5, 0x8f}) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000100)={r2, 0x94}, 0x8) 15:50:34 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0xff7f000000000000, 0x10) 15:50:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$CAPI_SET_FLAGS(r1, 0x80044324, &(0x7f0000000080)=0x1) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x5, 0x7ffffffffffffd, 0xff, 0x6, 0x9, 0x200}, &(0x7f0000000100)=0x20) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000000c0)) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000280)) connect$netrom(r1, &(0x7f0000000140)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x7}, [@default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) semop(0x0, &(0x7f0000000100), 0x2d) semget(0x3, 0x7, 0x200) semget$private(0x0, 0x3, 0x44) semget$private(0x0, 0x4, 0xf46caef59f2a7480) semget(0x1, 0x4, 0x220) r2 = semget(0x0, 0x0, 0x0) semctl$IPC_RMID(r2, 0x0, 0x10) 15:50:34 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) r0 = socket$caif_stream(0x25, 0x1, 0x0) ioctl$int_out(r0, 0x5460, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) write$P9_RLERROR(r1, &(0x7f0000000040)={0x27, 0x7, 0x2, {0x1e, '-cpuset,wlan0%}selfppp0\'user##'}}, 0x27) 15:50:34 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:34 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0xffffffff00000000, 0x10) 15:50:34 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x1000000) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") timer_create(0x3, &(0x7f0000001340)={0x0, 0x38, 0x0, @thr={&(0x7f0000000240)="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", &(0x7f0000001240)="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"}}, &(0x7f0000001380)=0x0) clock_gettime(0x0, &(0x7f00000013c0)={0x0, 0x0}) timer_settime(r1, 0x1, &(0x7f0000001400)={{0x0, 0x989680}, {r2, r3+30000000}}, 0x0) r4 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x90401, 0x0) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f0000000200)=r5) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r6 = syz_open_dev$vbi(&(0x7f00000014c0)='/dev/vbi#\x00', 0x2, 0x2) setsockopt$inet_dccp_int(r6, 0x21, 0xa, &(0x7f0000001500)=0xd19, 0x4) ioctl$VIDIOC_S_CROP(r4, 0x4014563c, &(0x7f0000001440)={0xa, {0x7, 0x8, 0x3, 0x7}}) r7 = socket(0xa, 0x806, 0x2) getsockopt$bt_BT_CHANNEL_POLICY(r7, 0x112, 0xa, &(0x7f0000000000)=0x40, &(0x7f00000000c0)=0x4) r8 = semget(0x0, 0x3, 0x1) semop(r8, &(0x7f0000001480)=[{0x3, 0x5, 0x800}, {0x4, 0x9, 0x800}, {0x3, 0x5}, {0x3, 0x80000000, 0x800}, {0x1, 0x6, 0x1800}, {0xfffffffffffffffe, 0x6, 0x7fe}, {0x1, 0x4, 0x1800}, {0x3, 0x4, 0x1800}], 0x8) semop(0x0, &(0x7f0000000100), 0x2d) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r7, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000140)=0x14) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 1737.316752][ T3707] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:34 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000b67000), &(0x7f00000000c0)=0x4) 15:50:34 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x2) 15:50:34 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) syz_read_part_table(0x400040000000, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="17d40af924c46140d4b56b8da7c25750483e4e2a6e7370c6fbec0e1198010a696359c4d67a823682459811481a4bc9678febef8f13ae54e4655e9f13a75d05bae13aaa67c12cc29ba2", 0x49, 0x200}]) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:50:34 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) syz_open_dev$vbi(&(0x7f0000000340)='/dev/vbi#\x00', 0x2, 0x2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x4, 0x4002c0) getpeername$inet(r1, &(0x7f0000000100), &(0x7f0000000140)=0x10) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x4e20, 0x7ff, @ipv4={[], [], @empty}, 0x6}, {0xa, 0x4e21, 0x9, @rand_addr="aa293582d916d69fe88216afaa8d8391", 0x2}, 0x7ff, [0x7, 0xc000000000000000, 0x3, 0x1, 0x7c, 0x2, 0x0, 0xff0]}, 0x5c) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={0x0, 0x97c8}, &(0x7f0000000240)=0xc) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000380)={r2, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) 15:50:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000000)) ioctl(r0, 0x7fff, &(0x7f0000000040)="11dca5055e0bcfec7be070") pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='./file0\x00') semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) r1 = accept(r0, &(0x7f0000000140)=@ax25={{0x3, @rose}, [@remote, @null, @default, @remote, @rose, @netrom, @default, @netrom]}, &(0x7f00000001c0)=0x80) ioctl$SIOCX25GFACILITIES(r1, 0x89e2, &(0x7f0000000200)) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:34 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:34 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x2000000) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) [ 1737.958750][ T4047] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:35 executing program 4: symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x501000, 0x0) ioctl$SIOCX25GDTEFACILITIES(r0, 0x89ea, &(0x7f0000000040)) 15:50:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) fcntl$setlease(r0, 0x400, 0x1) fstatfs(r0, &(0x7f00000000c0)=""/204) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:35 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x6, @ipv4={[], [], @local}, 0x2d5}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f00000000c0)={@initdev, 0x0}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000140)={@loopback, 0x5f, r1}) 15:50:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:35 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x40000000) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:35 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x202, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000f80)=@filter={'filter\x00', 0xe, 0x4, 0xe78, [0x0, 0x20000100, 0x20000bfc, 0x20000d4a], 0x0, &(0x7f0000000080), &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{0x11, 0x48, 0x88ff, 'eql\x00', 'bond0\x00', 'nr0\x00', 'bcsh0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0xff, 0x0, 0xff], @empty, [0x0, 0xff, 0xff, 0xff, 0xff], 0x966, 0x9e6, 0xa16, [@among={'among\x00', 0x880, {{@zero, @zero, 0x0, {[0x3f, 0x4, 0x1, 0x6, 0x3, 0x2, 0xfffffffffffffffd, 0x8, 0x7, 0x7, 0xff, 0x2d6, 0xffffffff, 0x80, 0x8000, 0x80000001, 0x463, 0x3f, 0x5, 0x8, 0x8, 0x3, 0x800, 0x5, 0x400, 0x8, 0x4, 0xffffffffffffeaf5, 0x6, 0x4000000000000, 0xc4, 0x8000, 0x100000000, 0x23b, 0x6, 0x9, 0x0, 0x3, 0x1ff, 0x7, 0x101, 0x4, 0xafa, 0x100, 0x1f, 0x5, 0x5, 0x1, 0x900000000000, 0x2, 0x21, 0x100, 0x660, 0x7, 0x3, 0x7fffffff, 0x8000, 0x9, 0x8, 0x0, 0x8f3a, 0x1, 0xfffffffffffffffd, 0x6, 0x9, 0x5, 0x2, 0x0, 0x2, 0x3, 0x3, 0x7fff, 0x9, 0x7, 0x7f, 0x7ff, 0x0, 0x10000, 0xc4, 0x3, 0x1f69, 0x9a02, 0x40, 0x7f, 0x100000000, 0x6, 0x0, 0x6, 0x5, 0x401, 0x2, 0x100, 0x2, 0x2, 0x6, 0x9, 0xffff, 0x100000001, 0x7, 0x81, 0x1, 0x6, 0x997, 0x5, 0xbb, 0x1f, 0x7, 0xde, 0x0, 0x2, 0xca, 0x5, 0x6, 0x8, 0x0, 0x7fffffff, 0x3ff, 0x8001, 0x0, 0xb9f0, 0x100000000, 0x7, 0xd1f3, 0x101, 0x6, 0x9, 0x5, 0x8, 0x820, 0x7a8, 0x5, 0x9d, 0x7, 0x72, 0x4, 0x4, 0xfffffffffffffff7, 0x6, 0x0, 0x81, 0xfc, 0x63, 0x3, 0x5, 0x5, 0x0, 0x4, 0x0, 0x1, 0x100000000, 0x4, 0xffffffffffff8001, 0xfffffffffffffbff, 0x0, 0x9d6f, 0x8000, 0x1000, 0x7, 0x3, 0x2ac1, 0x80, 0x4, 0x7, 0x0, 0x80, 0x7, 0x6, 0x0, 0x8000, 0x40, 0x3, 0x0, 0x3, 0x8, 0xde, 0x8000, 0x8, 0x5, 0x7, 0x1, 0x7, 0x3, 0x2, 0x7fff, 0xffffffffffff8001, 0x0, 0xff, 0x0, 0x4, 0xfffffffffffffffb, 0x200, 0x0, 0xfffffffffffffffe, 0x7f, 0x1, 0xfffffffffffffb88, 0x100000000, 0x9, 0x7, 0x28f9, 0x76db, 0x5, 0x8bf, 0x400, 0x8, 0xccea, 0x6, 0x3, 0x8, 0x20, 0x6, 0x28f, 0x1, 0x8, 0x2, 0x100, 0x92, 0xffffffff, 0x3, 0x80800, 0x7, 0x9, 0x51ddaf3b, 0x6dd, 0x5140, 0x100000001, 0x1f, 0x6, 0x5, 0xfffffffffffffeff, 0x7, 0x8, 0x80000001, 0xfff, 0x9, 0x6, 0x7, 0x4, 0x200, 0x1, 0xa2a9, 0x0, 0x96e, 0x1, 0x2, 0x7, 0xd1e, 0x6, 0x603, 0x8d6c, 0x3, 0x1, 0x8, 0x29a4, 0x8, 0x9, 0x3], 0x5, [{[0x3, 0x8001], @loopback}, {[0x9, 0x8], @rand_addr=0x4e6}, {[0x1, 0xf2], @remote}, {[0xfff, 0x8001], @multicast1}, {[0x6, 0x7], @broadcast}]}, {[0x100, 0x0, 0x11, 0x8, 0x100, 0x1f, 0x1b1, 0x6, 0x6a6, 0x100, 0x2, 0x7, 0x0, 0x7, 0x0, 0x3f, 0x1b6, 0x7fffffff, 0x0, 0x1000, 0x2, 0x800, 0x4, 0x0, 0x9, 0x8, 0x6, 0x7, 0x2, 0x6, 0x2, 0x2, 0x7, 0xf34c, 0x1, 0xd2, 0x1, 0x874, 0x4, 0x6, 0xd4, 0x800b, 0x0, 0x1f, 0x9, 0x7, 0x1ff, 0xfffffffffffffffc, 0x1, 0x5, 0x401, 0xfffffffffffff000, 0x1516, 0x0, 0x7f, 0xfffffffffffeffff, 0x6, 0x8, 0x3, 0x71f, 0x3, 0x80000001, 0x1, 0x8, 0x4, 0x4, 0x400, 0x1ff, 0x8, 0x100, 0x0, 0x6, 0x38, 0xca0a, 0x0, 0x3, 0x4, 0x3ff, 0x9, 0x5, 0xd, 0x4, 0xdb6, 0x1, 0xfffffffffffffeff, 0xffffffffffff9f24, 0x9, 0x8, 0x7ca8, 0x9, 0x7fffffff, 0x9, 0x10001, 0x3, 0xffffffff, 0x5, 0x2a1, 0x5a1, 0xfffffffffffffffd, 0x6, 0x5cc6, 0x6, 0x81, 0x4, 0x7fff, 0x5, 0xff, 0xf1fa, 0x9, 0x7, 0x8, 0x8, 0x5, 0x65b, 0x81, 0x2, 0xff, 0x5, 0x8472, 0x0, 0xa9c7, 0xa70b, 0x9, 0x9, 0x7fffffff, 0x2, 0x7, 0x8c2, 0x1, 0x7, 0x7a49d8be, 0x0, 0x1, 0x100000001, 0x1ff, 0x80000001, 0x3, 0x9, 0x5, 0x1cf, 0x4, 0x8, 0x4, 0xff, 0x3, 0x100000001, 0x1, 0x5, 0x80000001, 0x10001, 0x3, 0x0, 0x25, 0x5, 0x40, 0x9, 0x80, 0xfff, 0x7f, 0x7, 0x80, 0x80, 0x9, 0xfa, 0x6, 0xffffffff, 0x8, 0x1, 0x126, 0x7, 0x6d, 0x7f73, 0x400, 0xffffffff, 0x7b9fcae0, 0x4, 0x1000, 0x0, 0x8, 0x10d, 0x2, 0xd8, 0x3, 0xffffffffffff0001, 0x9, 0x80000000, 0x3, 0x7, 0x80, 0x7ff, 0x7fff, 0xe4, 0x1b, 0x3, 0x1000, 0x6, 0x7ff, 0xfffffffffffffeff, 0x8, 0x5, 0x4800000000000, 0x1, 0x7ff, 0x6, 0xd270497, 0x3, 0x7e, 0x4566, 0x100000001, 0x7152f727, 0x7, 0x2, 0xffffffffffffb98d, 0x9, 0x37ac7842, 0x7ff, 0x7, 0x1e, 0x8, 0x401, 0x0, 0x7efe, 0x6a3, 0x0, 0x7, 0x7, 0xafef, 0x899a, 0x2, 0x8, 0x7, 0x8, 0x7fff, 0x401, 0x2, 0x2, 0x1000, 0x8, 0xffffffffffffffff, 0x2, 0x5, 0x3, 0x2fce, 0x4, 0x7, 0x8000, 0x3, 0x4bcc, 0x2, 0x5, 0x7f, 0x20, 0x5, 0x9, 0x7ff, 0x3ff, 0x5], 0x3, [{[0x2, 0x7fff], @initdev={0xac, 0x1e, 0x1, 0x0}}, {[0x58, 0x1], @dev={0xac, 0x14, 0x14, 0x2a}}, {[0xdbe9, 0xeb6e], @dev={0xac, 0x14, 0x14, 0x1f}}]}}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x5}}}], [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x2}}}, @common=@log={'log\x00', 0x28, {{0x7, "26fc2e527eaa1ac6b90e24bbc28f0063064daa0e82305919c90131652e43", 0x4}}}], @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}}, {0x0, 0x41, 0x11, 'nlmon0\x00', 'bond_slave_1\x00', 'lo\x00', '\x00', @local, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0x6e, 0x6e, 0xb6, [], [], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x7, 0x35b, 0x81}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{0x0, 0x1, 0x15, 'ifb0\x00', 'vcan0\x00', 'vxcan1\x00', 'veth0_to_bridge\x00', @random="c796957397f3", [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @broadcast, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], 0xbe, 0xee, 0x11e, [@nfacct={'nfacct\x00', 0x28, {{'syz1\x00', 0x7ff}}}], [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x100}}}], @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x53f3}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{0x9, 0x40, 0xa6ff, 'vxcan1\x00', 'bridge_slave_0\x00', 'bcsf0\x00', 'gre0\x00', @broadcast, [0x0, 0xff, 0xff, 0x0, 0xff], @link_local, [0x0, 0xff, 0xff, 0xff, 0xff], 0x6e, 0x9e, 0x1ce, [], [@common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}], @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x3, 'system_u:object_r:audisp_var_run_t:s0\x00'}}}}]}]}, 0xef0) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) sendto$llc(r1, &(0x7f0000001000)="4ea55bcec90ef8c3f8f9db42d4714b9452f7b628bf6553bdbdacdb700f580f419811676028f8d9689d05cb40d906644dfcb44b46e34647ac7d30542f874ef9721993e119a3c16a34a91bbe9ac01034e8c2bb7249574c328435769bd9645096e49eaa48fd32b516f481150a538273cee034950373", 0x74, 0x80, &(0x7f0000001080)={0x1a, 0x205, 0x3, 0x40, 0x200, 0x5}, 0x10) 15:50:35 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x3) 15:50:35 executing program 4: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x802, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x40000, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f00000002c0)="af300e302e6ca2abcad9e35281f997ef", 0x10) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffff9c, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000000c0)={r2, 0x0, 0x1, 0x20, 0xfffffffffffffff9}) ioctl$PPPIOCGNPMODE(r1, 0xc008744c, &(0x7f0000000500)={0xc021, 0x1}) syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00') r3 = socket$key(0xf, 0x3, 0x2) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r4, 0xe19, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x81}, 0x1) r5 = fcntl$getown(0xffffffffffffff9c, 0x9) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000040)=r5) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f0000000540)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="00002bbd7000ffdbdf250300000050000100080006007365640008000200bd0000000800080005000000080009005708000b007369700008000b007369700008000b00736970000c0006006c6296376c637200000008000600736564000800060003000000080004000200c11e0bf1cefc19491fce9753c57f760a29dca980fe4da8a8c520b307dd8693ffd1aeec7054f31ed9a24618b4a0d05e27d244be8f5b8c92f69d1f04c4d9d593d6304ff7c1a583f5e403e7a2f391c9347ab1f000a1ac19883ac714c7de554848679366b5f35c9d1041a5b3383d838ed71a7982900a80d5e3b77bf11b3066e17e8607f1db4c537ddb91d18d308992d185542f5a3fb7b27ab19d21742b"], 0x74}, 0x1, 0x0, 0x0, 0x48000}, 0x4000004) 15:50:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$bt_hci(r0, 0x0, 0x0, &(0x7f0000000100)=""/113, &(0x7f0000000180)=0x71) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xb8, 0x200000) write$P9_RLOPEN(r1, &(0x7f00000000c0)={0x18, 0xd, 0x1, {{0x3, 0x3, 0x5}, 0x10001}}, 0x18) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:35 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:35 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0xf6ffffff) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) [ 1738.679722][ T4532] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:35 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x5, 0x200000) accept$inet(r1, 0x0, &(0x7f0000000200)) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000180)=0x1) r2 = accept4(r0, &(0x7f0000000040)=@ax25={{0x3, @bcast}, [@remote, @rose, @bcast, @netrom, @bcast, @netrom, @netrom, @netrom]}, &(0x7f0000000100)=0x80, 0xea14fcbc65c236f5) accept4$llc(r2, 0x0, &(0x7f0000000140), 0x800) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000240)={0x41, 0x3}, 0x10) prctl$PR_SET_PDEATHSIG(0x1, 0xf) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000280)={'veth0\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1f}}}) 15:50:35 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) set_robust_list(&(0x7f0000000100)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x2, &(0x7f00000000c0)={&(0x7f0000000080)}}, 0x18) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x1, 0x40000) write$UHID_INPUT(r0, &(0x7f0000000240)={0x8, "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", 0x1000}, 0x1006) 15:50:36 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x400, 0x0) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000100)={0x81, 0x6, 0x0, [{0x1, 0x80000001, 0x401, 0x0, 0x40, 0x7d, 0x79}, {0x100, 0xbb94, 0x1, 0x100000001, 0x8, 0x8, 0x10000}, {0x9, 0x6, 0x6, 0x6, 0x2, 0x0, 0x200}, {0x9009, 0x9, 0x197, 0xa73, 0x703e, 0x5, 0x9}, {0x3f, 0x8c71, 0x3, 0x0, 0x5, 0x9, 0xc2}, {0x8000, 0x7fff, 0x7, 0xc, 0x7, 0x8, 0x80}]}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}, 0x7}, 0x1c) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x6, 0x9}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000300)={r2, @in6={{0xa, 0x4e24, 0x8d2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}}, 0x0, 0x3, 0x80000001, 0x10001, 0x20}, &(0x7f00000003c0)=0x98) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000400)={0x80000000, 0x3}) 15:50:36 executing program 4: syz_read_part_table(0x1, 0xffffffffffffffe6, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:50:36 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:36 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') 15:50:36 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0xfffffff6) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) [ 1739.272797][ T4924] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:36 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0xb) 15:50:36 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) pipe(&(0x7f0000000040)) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x10001, 0x10) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="584add6f4bb122d9fac143e1dfe93c8531972a730d01a62ae7e7cfea52b70a3b2a56b3271e00d7dedc914f8f4496fa2fc9307e5f9418c289ab6207e1c9b236a1d0fecf8448656ddd4dc47d642f8bb57536e782d40af26c61ea43f9bc1a6b605522f86149b9fc22e0193c1c97696c7416b64a6fa66ec64c1cb63c6ec2fe6e9ce422") r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$VIDIOC_ENUMSTD(r1, 0xc0485619, &(0x7f0000000300)={0x5, 0x0, "8f7cfe7727063f38c67dd770e0896d6d0e8b7074fb4c696c", {0x0, 0x3378}, 0x9}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x800, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r2, 0xc0585605, &(0x7f0000000240)={0x1, 0x0, {0xfffffffffffffffa, 0x200000, 0x301e, 0x6, 0x7, 0x6, 0x2, 0x3}}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r3 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x40040) ioctl$BLKIOOPT(r3, 0x1279, &(0x7f00000001c0)) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) bind$pptp(0xffffffffffffff9c, &(0x7f0000000000)={0x18, 0x2, {0x3, @multicast2}}, 0x1e) 15:50:36 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x2, 0x0) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f0000000140)={0x0, 0x0, 0x2080}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x200, 0x0) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000080)='[+\x00', 0x0, r0) socket$inet6_udp(0xa, 0x2, 0x0) eventfd(0x2) 15:50:36 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) r0 = dup(0xffffffffffffff9c) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') r1 = accept4$nfc_llcp(0xffffffffffffff9c, 0x0, &(0x7f0000000000), 0x80000) fcntl$getownex(r1, 0x10, &(0x7f0000000040)) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast]}) 15:50:36 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x100000000000000) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:36 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0xa, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r2 = dup2(r0, r1) getresuid(&(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100)=0x0) r4 = getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@local, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000240)=0xe8) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) fstat(r1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in=@broadcast, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) fstat(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000800)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in6=@loopback}}, &(0x7f0000000900)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0, 0x0, 0x0}, &(0x7f0000000980)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000ac0)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r17 = geteuid() r18 = getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000bc0)={{{@in=@multicast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000cc0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000d00)={0x0, 0x0, 0x0}, &(0x7f0000000d40)=0xc) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000d80)={0x5d0, 0x0, 0x6, [{{0x6, 0x3, 0xa1, 0x200, 0x0, 0x5, {0x0, 0x6, 0xff, 0x1, 0x4, 0x7, 0x28e, 0xed, 0xfff, 0x7, 0x6, r3, r4}}, {0x4, 0x1, 0x7, 0x4, '\\#$proc'}}, {{0x2, 0x3, 0x7fff, 0x0, 0x71c0, 0x1, {0x4, 0x6, 0xc4c0, 0x6, 0x4, 0x1ff, 0x7fffffff, 0x9, 0x1e1a, 0x6, 0x7, r5, r6, 0x1ff, 0x8}}, {0x2, 0x9, 0x2, 0xea5, '%@'}}, {{0x6, 0x2, 0x1000, 0x7, 0x10000, 0x80000000, {0x1, 0x7fff, 0x3, 0xffff, 0x3f, 0x0, 0x0, 0x7, 0x8, 0x3ff, 0xa0c4, r7, r8, 0x7fffffff, 0x80000000}}, {0x5, 0x8d, 0x9, 0xffffffff, 'vboxnet1+'}}, {{0x1, 0x3, 0x1000, 0x4, 0x8000, 0x9671, {0x1, 0xffffffff, 0xd7, 0x1, 0x3, 0x5, 0x8, 0x5f, 0x7fffffff, 0x0, 0x2, r9, r10, 0x6, 0x3}}, {0x3, 0x6, 0x11, 0x0, '.wlan1selinuxppp0'}}, {{0x4, 0x2, 0x6, 0x5, 0x9, 0x6, {0x3, 0x4, 0xc88, 0x9, 0x3, 0x3, 0x7, 0xef, 0x9, 0x7, 0x8, r11, r12, 0x4, 0x2d}}, {0x0, 0x4, 0x2, 0x35ef3fe4, ']\''}}, {{0x5, 0x3, 0xff, 0x0, 0x8, 0x0, {0x1, 0x1f, 0x80000001, 0x1ff, 0x8, 0x1ff, 0xffffffffffff0001, 0x7fff, 0x7, 0x2, 0x558eb7f0, r13, r14, 0x7fffffff, 0xfffffffffffffffc}}, {0x4, 0x5, 0x0, 0x8}}, {{0x1, 0x1, 0x2, 0xfff, 0x0, 0x2, {0x1, 0xb0, 0x10000, 0x364, 0x5240, 0x2, 0x2, 0x6, 0xffffffffffffff80, 0x8001, 0x1, r15, r16, 0x5b11, 0xffffffffc2027d9a}}, {0x5, 0xffffffff, 0x11, 0x7, ')posix_acl_access'}}, {{0x5, 0x2, 0x0, 0xffff, 0xd3, 0x1000, {0x2, 0x288, 0x8, 0x6, 0x6, 0xd2f3, 0x80000000, 0x2b, 0x4, 0x2, 0x233ea98, r17, r18, 0x6e96, 0xbb3}}, {0x0, 0x6, 0x0, 0x422}}, {{0x1, 0x2, 0x80000001, 0x0, 0x80, 0x9, {0x4, 0x8, 0x80, 0x4, 0xbe4, 0x4, 0x80, 0xfffffffffffffcc9, 0x6, 0x80, 0x8, r19, r20, 0x1, 0x4}}, {0x0, 0x100, 0x9, 0x3, '/trusted('}}]}, 0x5d0) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:37 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'nat\x00'}, &(0x7f0000000100)=0x78) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xd45, 0x80000) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000040)={0x1, 0x3f, [{0x18000000000, 0x0, 0x1}]}) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') [ 1739.992301][ T5279] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:37 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xd5, 0x480000) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000080)={'ipvs\x00'}, &(0x7f0000000100)=0x1e) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x3d, &(0x7f0000000380), &(0x7f00000000c0)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f00000001c0)={0xf, 0x8, 0xfa00, {r2, 0x6}}, 0x10) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={0x0, 0x3}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000280)={r3, @in={{0x2, 0x4e24, @multicast2}}, 0x80000001, 0x1ff, 0x1ff, 0x1, 0x44}, &(0x7f0000000340)=0x98) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f00000003c0)=[0x3, 0x2], 0x2) 15:50:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semget$private(0x0, 0x3, 0x2) r1 = semget(0x2, 0x2, 0x28) semctl$IPC_RMID(r1, 0x0, 0x10) 15:50:37 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) r0 = accept$nfc_llcp(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x60) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'vlan0\x00'}) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x800) setsockopt$inet6_dccp_int(r1, 0x21, 0xa, &(0x7f0000000180)=0x1, 0x4) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000140)=0x8) setsockopt$sock_void(r0, 0x1, 0x24, 0x0, 0x0) ioctl$SIOCAX25DELFWD(r1, 0x89eb, &(0x7f0000000240)={@bcast, @default}) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:50:37 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0xf) 15:50:37 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x200000000000000) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:37 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = open(&(0x7f0000000040)='./file0\x00', 0x40, 0x1) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) socket$inet6(0xa, 0x80000, 0x1) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:37 executing program 3: r0 = semget$private(0x0, 0x7, 0xa0) semctl$IPC_RMID(r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000000)={0x6, 0x6}) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) r2 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0xe36, 0x800) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000100)) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:37 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") [ 1740.564507][ T5699] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 1740.564507][ T5699] The task syz-executor.5 (5699) triggered the difference, watch for misbehavior. 15:50:37 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x6c60c0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20801000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='&\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000025bd7000fddbdf2512000000100006000400020008000100fbffffff"], 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x41) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000180)=""/43) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') [ 1740.754566][ T5765] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:37 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x200, 0x80) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r2, 0x406, 0x70bd26, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x85}, 0x800) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000100)={0x1b23, 0x1, 0xfffffffffffffffb, 'queue1\x00', 0xffffffff00000000}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) getpeername(r0, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000000)=0x80) getsockopt$XDP_STATISTICS(r1, 0x11b, 0x7, &(0x7f0000000140), &(0x7f0000000180)=0x18) 15:50:38 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x4000000000000000) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:38 executing program 4: syz_read_part_table(0x0, 0x2d7, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') r0 = creat(&(0x7f0000000000)='./file0\x00', 0x20) getsockopt$inet_udp_int(r0, 0x11, 0x6f, &(0x7f0000000040), &(0x7f0000000080)=0x4) inotify_add_watch(r0, &(0x7f00000000c0)='./file0\x00', 0x21) 15:50:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair(0x1b, 0x7, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_dccp_buf(r1, 0x21, 0x2, &(0x7f00000001c0)=""/24, &(0x7f0000000200)=0x18) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f00000000c0)=ANY=[@ANYBLOB="62726f7574650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/16], @ANYBLOB="00000000000000000000001a00000000ffff00000000000000000000000000000000000000002000"], 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000000), 0x2aaaaaaaaaaaad17) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000240), &(0x7f0000000280)=0x4) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:38 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x20000000000, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:38 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x11) 15:50:38 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') syz_mount_image$nfs(&(0x7f0000000000)='nfs\x00', &(0x7f0000000040)='./file0\x00', 0x1f, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="c168469c2116344ce3b8be4517b50bb402d48d2e5020f51941934d6272570dcf6ae70a45a8851a7afb", 0x29, 0x3}], 0x800001, &(0x7f0000000100)='\x00') 15:50:38 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:38 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0xf6ffffff00000000) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r1 = semget(0x3, 0x7, 0x110) semctl$IPC_RMID(r1, 0x0, 0x0) getgroups(0x5, &(0x7f0000000000)=[0xee01, 0xee00, 0xffffffffffffffff, 0xee01, 0xee00]) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0) getgroups(0x3, &(0x7f0000000240)=[r2, r3, 0x0]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 1741.443566][ T6062] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:38 executing program 4: r0 = syz_open_dev$cec(0xffffffffffffffff, 0x0, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000040)={{{@in6=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@empty}}, &(0x7f0000000140)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000180)={@rand_addr="0374ad2c87d495dd4d6977094bb09cfd", 0x2, r1}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x7fff, 0x8, 0x1000, 0x5, 0x1, 0x8, 0x5518000000000000}, 0x1c) syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:50:38 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400000, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r1, 0xc040564a, &(0x7f0000000080)={0x200, 0x0, 0x2014, 0x5, 0x20, 0x81, 0x100000001}) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semget$private(0x0, 0x0, 0x1) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x220242, 0x0) ioctl$VIDIOC_STREAMOFF(r1, 0x40045613, &(0x7f00000000c0)=0x22ee) r2 = semget$private(0x0, 0x3, 0x180) ftruncate(r0, 0x1a) semctl$SETALL(r2, 0x0, 0x11, &(0x7f0000000000)=[0x5fd]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:38 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:39 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x101000, 0x0) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f0000000080)=0x5) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000100)={'bond0\x00', 0x68}) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x10, r1, 0x0) 15:50:39 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x80000, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x4e23, 0x3, @empty, 0x5}}, 0x0, 0x8, 0x0, "e28eaee106b6224d7d9c2d9f1048bd201b0ec1bc01fe5b245dcecd79081f0c66992360d48e884c8af8cffe56a33eddf680f8d38f5b6737ea250b7d2063e0a90d409d853b7f2158b2c877638cd1bde13d"}, 0xd8) 15:50:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) syz_mount_image$nfs(&(0x7f0000000000)='nfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3ff, 0x4, &(0x7f0000000440)=[{&(0x7f0000000100)="ae67b05f8da5de3b1f45bf0459d64840f122e51f3b521c05bc5a4d54025155bf2138debb8cb8b59ac7e1e5c302875b33f00b50ef3c091554f4b528589ba81f7046b51d139006ff7aafe2bcd36580e336fd0814f82f2803dd513cf7c14bc405b4ebd1cdde6d54bbfed9eefb34a34f7d2c132c4198ab4c2ae125bfb1ae82a8f3a71176091b", 0x84, 0x3}, {&(0x7f00000001c0)="fc6c92358438640e539a6e192c47d3aa5526dac3c80835c47330d0d11a0bf096a0f0974f9827b367b69db098f9fdace6cd1e9bc256537df3dd0a700420078bc73f2de6bae443c0f0d3c871596c8646c46f59704dd90b2bd5950540a9b368859d1c81ef4cd99d9dd6fe1cb8a0c5348dc6db33fb562f438ee21385370323e03bbcde525f893fa8607a5fdc770df254116cfce684c7e192fbe09f6f5bd22bac41bfbcb3d47abbb1f63f78b1c04bd640113838f372cc1cf810d213f2307d39f092339db2a978360f7e96bf2b0dde8617f1e07e4afa017025fe4eceb2946f3e8f34f858ed4228827fd7979a37806d0876bd30cdaba175b32fe7", 0xf7, 0xa0d5}, {&(0x7f00000002c0)="09a9f3ad11cbe866a2df9ca59e100e7c676d0ca786770f46e37bcc3a7808940f4da556b860fb3362beb7b48af40b83be224f2bdd43c93eb0f9dd2f2b01caf9db563de8e74fc27e706959ca22dc7ff3d8457482018ba0f11fd1774a2a5ce5fdcfbdda1462243689dcd983f32c98fd0a979278e22ea05f945f03f9b522aae034da0aa2b21259b8906311fc1fc981480c6f557f540329b3fb3c742993c5274669c5291ab5580078f8f96cf5a3be2243cae79a8f0ab7ffcc9df8b0b4e6da8a8631bbd3d1f55059bbca559b8ca6c83f0165dceb2d279dc0dd23640a48fecbd6f53a54933af3920b1e8a21cf9a2b98dc88fbaa43014aba", 0xfffffffffffffe39, 0x400}, {&(0x7f0000000500)="81325507d465bf80d6a535ac418695976b6e52137af0a8ca255bef651c8f7f6272758f5f9e6a14bb7ea73749c1cc08313a545915029028853e69881dbc91a28629afd33b4e63571edc748bdada02eeddb04da1cefd4e5ff16abf1e8e", 0x5c, 0x3}], 0x200000, &(0x7f00000004c0)='!.\xd5cgroup\x00') semctl$IPC_RMID(0x0, 0x0, 0x10) [ 1742.021292][ T6495] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:39 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x12) 15:50:39 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dlm-control\x00', 0x2000, 0x0) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000000a80)) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000340)=0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000380)=r3) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r4, 0x7fffc) 15:50:39 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) connect$llc(r1, &(0x7f0000000080)={0x1a, 0xffff, 0x4, 0x7, 0xfff, 0x10001, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f0000000100)) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:39 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:50:39 executing program 0: r0 = ioctl$TUNGETDEVNETNS(0xffffffffffffff9c, 0x54e3, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0xa, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 15:50:39 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:39 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4, 0x80000) readlinkat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/172, 0xac) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000040)=0x5, 0x4) syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') [ 1742.811982][ T6977] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:40 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x6, @local, 0x5522}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:40 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x3, 0x40000) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000380)) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r2, 0x7fffc) 15:50:40 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='./file0\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file1\x00') 15:50:40 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x1c) arch_prctl$ARCH_SET_GS(0x1001, 0x9) 15:50:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) bind(r0, &(0x7f00000000c0)=@l2={0x1f, 0x100, {0xffffffffffff81b2, 0x0, 0x100, 0x1, 0x5, 0xff}, 0x8, 0x7}, 0x80) 15:50:40 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x13) 15:50:40 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:40 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='./file0\x00') prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) getsockname(0xffffffffffffffff, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000000)=0x80) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10001, 0x0) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000040)) [ 1743.506284][ T7458] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) dup3(r0, r0, 0x80000) semctl$IPC_RMID(0x0, 0x0, 0x10) prctl$PR_GET_NAME(0x10, &(0x7f0000000100)=""/59) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x28000, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x8a40, 0x1) 15:50:40 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet(0x2, 0x3, 0x401) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}, 0x2}, 0xb) 15:50:40 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, 0xffffffffffffffff, 0x7fffc) 15:50:40 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x7ff, 0x80) ioctl$TIOCGPTPEER(r0, 0x5441, 0xe44) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000800)={0xfffffffffffffff8, 0x9}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f0000000100)) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080)=0x100, 0x4) vmsplice(r1, &(0x7f0000000740)=[{&(0x7f0000000180)="91948e3f4987dedc965440fe76afd8cbe206e468bd540acf5e2bdd800cd3e4648af1b65e50f0c62d6202bba64833eea5b256499ad6bb19033109ad10c081bf615a18afb55aefbebebff81bbd2643eb2c0c8fe6c508a9e37d6832d1635dc260de30b4d9317aafc84ca0759921ef94e619b979d196076c510dee8b22d7ed25fa2c31baf3c107de2d106bd3b007b763605661c4aa9ca17202bbd8d80d5ee40b90f6b9c91439931b1657d0ac79a6a45876007bc06fd2f965116e4a2d8129b45657b60d214721afb35ee0d66881c7308dc7efa1c1ff68d135cdece3", 0xd9}, {&(0x7f0000000280)="d6972bb9605adf9c473473efc14886715ff1db", 0x13}, {&(0x7f00000002c0)="707b60430106e75e28182b6186cf50830f5fc39dba4a6b392f1ff4611b45694948771810b70499f3ceb8355f984948c6454bd12662ac693cb90c08823bb9fa62afb2c2f9e659562e9ec4e7cfcbb42b7eac484fb5552a", 0x56}, {&(0x7f0000000340)="daef2c78cb4ac03c5030cf45f1cb3e144e76b74e4e3ebdf680a1b06238c086ec8acc081ca7284f2448af4dead604420cdc50190fb42d1ef942e80cc2f735be1ea9fcd247f64bdb95e5aaa95d8887794900d225fbe3c4b8b16e3ecdd9e1233fb5ef68959e42e76f3cbcb800e3a65c80470c42a9262372d24c15632e9eba1029e08e917496f51fc1e8699148dea49e3911612dbc96a15e55ac4f8ae333b7c409669a09bb15ee4dbd6a5ef4", 0xaa}, {&(0x7f0000000400)="f6c45e25cb6379cb855e08f93f79a68794e922fc6fcb377ff896ccf7373f8f4fb073deff8b5cbc5d965f53986c7ffc6c522015ce6b1210f595ca6a33cf50e341e67bfa19bbc4c77f819218b48557ab3ba3eee242895c0a2d6c73d9e758844e5ecf5e12e6511c050a60d90086d80facdc460c3c8afe4e8230542325b3d5ac80c0649e06f95db06ca698dfad7538767a4dd8bfe955103fbfc20a77b9cffe010ff400e3cedf2abc34a10efa91efd469671d81a3366f44bd510772aa7dba17224b4114f4a212b2c973cef7c0a1b66b804d", 0xcf}, {&(0x7f0000000500)="a136a029c3e09c43695382b43b8c453201cdb38ba1c8b01382ef48be5849784e40c8c58e13f86608f14ec28d9e0c8fd2684ba599b1cfb861f6fe7a0bfa867c6f6a027e4263f58bf431015e50e7f1b41613d752c78244a140b87caa962066b8323b0e8d534b5e1f96c824ce3a6be0dde234ec6597cc704f7467b2684340a4896cec590b9730bdd6f20d79f8875d939acc060ea30f2c5ab07cd39d8513ceba97ff7e06476d626f53a9501896901445cf14c472ea9698cbf7996ef7da3759e9fc1daa0f7c996a67094792706e1fcfd07b7783d124dbf3ea40b7c00984532bc7e7abbdbe0ca2887f624b4bc1bf1a5b335b95f1ad26920b", 0xf5}, {&(0x7f0000000600)="2b1f6b795a0bc8017e6e1ace709c1e1c095104555751c729d2f250b0ddf1fe9586526044ab714a64dcfda0fb81eca346f82d98a547e0c3c24f13edc071d7b01777301b9b6ec24b44c2d0e044dc993ef41eaffe5eb25706c47badaca565d6c7d80a9430fc0bf81a95", 0x68}, {&(0x7f0000000680)="e9bda20589a949c5883bbf9fc99469ca23f4a9b3cce6520802f12fe9447c3da77b85192ebad35b551e123669e892b8bd8562b51cdeeb4df29f0ef27cbdc975d9da8f24f17d730bdd14637f2d", 0x4c}, {&(0x7f0000000700)="6304caf9cea741bd98", 0x9}], 0x9, 0x5) getsockopt$inet6_int(r1, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) open(&(0x7f0000000840)='./file0\x00', 0x208000, 0x29) 15:50:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200000, 0x0) getsockopt$netlink(r1, 0x10e, 0x7, &(0x7f00000000c0)=""/214, &(0x7f00000001c0)=0xd6) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:41 executing program 4: r0 = socket(0x1, 0x7, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003780)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@initdev}}}, &(0x7f0000003880)=0xe8) syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1, 0x52100) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x6) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000040)={0x0, 0x5, 0x3}) ioctl$NBD_DO_IT(r1, 0xab03) 15:50:41 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x4400) connect$unix(r1, &(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) 15:50:41 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) r1 = socket(0x0, 0x80002, 0x2) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x4000, 0x0) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x48, r2, 0xb00, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2}, @NBD_ATTR_SOCKETS={0x14, 0x7, [{0x8, 0x1, r0}, {0x8, 0x1, r3}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x4}]}, 0x48}, 0x1, 0x0, 0x0, 0x4010}, 0x40001) [ 1744.115911][ T7842] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:41 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x14) 15:50:41 executing program 4: syz_read_part_table(0x41, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:50:41 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) r2 = dup3(r0, r1, 0x7fffc) sendto$llc(r2, &(0x7f0000000340)="4a16720a56370a7d710c21ae6d4d17fbb6cb9940bc49be40923ce654f044f6680c40a3da66cb782fd20a82bd5c288b5835b258cd3ddd34734888417ff81020b1e24d40d78590875e848fa665dc161fcf06f27cca", 0x54, 0x0, &(0x7f00000003c0)={0x1a, 0x321, 0x100, 0x1, 0x2, 0x1ff}, 0x10) 15:50:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x290041, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:41 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$rds(0x15, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semget(0x3, 0x2, 0x2) r1 = semget(0x2, 0x2, 0x80) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000080)) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) r2 = accept4(r0, 0x0, &(0x7f0000000000), 0x80000) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f00000000c0)=0x11e7, 0x4) 15:50:41 executing program 4: syz_read_part_table(0x0, 0xffffffffffffff58, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:50:41 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:41 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) 15:50:41 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f00000007c0)='syzkaller\x00', &(0x7f0000000840)={'syz', 0x1}, &(0x7f0000000880)='/dev/snapshot\x00', 0xfffffffffffffff9) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000008c0)={r1, 0x11, 0xd7}, &(0x7f0000000900)={'enc=', 'raw', ' hash=', {'crc32\x00'}}, &(0x7f0000000980)="c4a3d4075be15915e43e5b1450a7b6011b", &(0x7f0000000a80)=""/215) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/qat_adf_ctl\x00', 0x10200, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440)='/dev/snapshot\x00', 0x200302, 0x0) fanotify_mark(r2, 0x20, 0x18, r3, &(0x7f0000000480)='./file0\x00') r4 = openat(0xffffffffffffff9c, &(0x7f0000000600)='./file0\x00', 0x10002, 0x1) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000640)={0x0, 0x1}, &(0x7f0000000680)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f00000006c0)={r5, 0x48, "8caa0265ef158d1d6d0f636b7e691fa6b6091db71814f55e304e13788c0a53bba949cbf48f00be3e35e23372ab582cc417658f286cee6e6ce85373305e3f22eb1ee2cfa3ca4063bc"}, &(0x7f0000000740)=0x50) fchmod(r0, 0x2) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x317, 0x1) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r3, 0x4018620d, &(0x7f0000000500)={0x73622a85, 0x100}) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r6 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4(r2, &(0x7f0000000540)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000780)=0x80, 0x800) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='trusted.overlay.origin\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x1) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r6, 0x7fffc) 15:50:42 executing program 4: r0 = open(&(0x7f0000000000)='\x00', 0x44000, 0x4) ioctl$KDDELIO(r0, 0x4b35, 0x2) syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x100000001, &(0x7f0000000100)={0xffffffffffffffff}, 0x117, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r1}}, 0x2db) setxattr$trusted_overlay_nlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U-', 0x5}, 0x28, 0x1) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@sha1={0x1, "ec913401be0aba8fbb9a025396cd7a785e338410"}, 0x15, 0x1) 15:50:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = semget$private(0x0, 0x0, 0x200) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f00000000c0)=""/102) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 1744.858896][ T8262] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:42 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semget$private(0x0, 0x4, 0x122) r0 = semget$private(0x0, 0x2, 0x1) semget(0x0, 0x2, 0xe) semget$private(0x0, 0x3, 0x2) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) semctl$IPC_RMID(r0, 0x0, 0x10) connect$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x2, {0x9cea, 0x8, 0x68, 0x400, 0x1ff, 0x6}, 0x0, 0x5}, 0xe) epoll_wait(r1, &(0x7f00000000c0)=[{}, {}, {}], 0x3, 0x10000) 15:50:42 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) socket$inet6(0xa, 0x1, 0x3) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:42 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r0 = semget$private(0x0, 0x4, 0x100) semctl$IPC_INFO(r0, 0x3, 0x3, &(0x7f00000000c0)=""/98) r1 = semget(0x2, 0x1, 0xc2) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000000)=[0x7, 0x100, 0x8]) r2 = semget$private(0x0, 0x3, 0x100) semctl$SETALL(r2, 0x0, 0x11, &(0x7f0000000080)=[0x1ff]) r3 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x8000, 0x0) ioctl$VIDIOC_DQBUF(r3, 0xc0585611, &(0x7f00000002c0)={0xf881, 0x4, 0x4, 0x2000640d, {}, {0x3, 0x2, 0xcb, 0xffffffffffff21b6, 0x10001, 0x83, "bf14a875"}, 0x1, 0x3, @planes=&(0x7f0000000280)={0x100000001, 0x5, @fd=r4, 0x5}, 0x4}) semget$private(0x0, 0x4, 0x80) r5 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x3, 0x2000) ioctl$VIDIOC_S_TUNER(r5, 0x4054561e, &(0x7f0000000180)={0x0, "d6d2202c8afc346a97cc52dffae37362052a108fd004a9dc25aeaffe21668020", 0x1, 0x0, 0x80000000000000, 0x80000000, 0x0, 0x3, 0x9, 0x6}) write$P9_RREMOVE(r5, &(0x7f0000000200)={0x7, 0x7b, 0x2}, 0x59) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:42 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f0000000100)='./file1\x00', &(0x7f00000001c0)='./file0\x00') 15:50:42 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000340)='/dev/vbi#\x00', 0x2, 0x2) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffff01) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) getsockname$llc(r0, &(0x7f0000000380), &(0x7f00000003c0)=0x10) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000400)={0x8eb9, 0x20}) dup3(r1, r2, 0x7fffc) 15:50:42 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000006540)='/dev/qat_adf_ctl\x00', 0x440d80, 0x0) connect$pppoe(r1, &(0x7f0000006580)={0x18, 0x0, {0x3, @random="8231de2e02f7", 'gretap0\x00'}}, 0x1e) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f0000000600)={"c792b7e341fdf62faa0ff498104570dc7615f1d65882ee6123dc9f2b7233357e9b1b3ad48e4fd0efe5fdbb10138114a25f0fb030970d68fdc3f649f16a530d205b82da254b8224dde422dab6e5dca3f19acacf67532622facf8cb50a0d2bfb8a7a1241dca45ea8b2646e0ae7a14b2b206ad8e14d9c495beb621f588606190363d21d829ed2c2522fd16c49c7b3d63d60db662fe57b7ecd0ecaeb59de640ce33fb402134e158d4b502662fad76a65c65bbcacbe65c61c183833611cb412c636c16719123090765733219145da401d0fae36b487ef9b469b2a891efb1be583315e96c3473e87758d1fe27319579d7c4f9f8db545d84527a88d95eaa4f579ee32a061dabd83a5bc7898cde8844e8063e417cf175c340b28030700c3bb70b5585b9e024ea5c2db015e1310d2dbc092f253d822eafcbb046708a1dcb8922f0ab61cae4fc25a5bf223fbf6c1c2edc969ec4ba00e5b7fecf6e65c64c7f485c687cf7c056c5a814f3ab374df6e0ccdae8e19eb564881fb0d4aa8ba99457ff7d793479962a5f2e001f56b86764b6f4e07d1fe426932bc35c542f82c45c5f789ab54745ef8843c51e076237de2cc60cc8764a31ea2bb6b70151a7e9ed62f9d4a5de0c50010000000000000186b91b8483647656e250b215e33d28da9c0e56429e7f6c92f65d15e6061ab12d4ea9bdf8f0393c408d8d9ab7d1aaecbfbc0736fc8ead546399fdbaa0ee90ffd0a508aef3cc99bd5ff0c3c104035c3645402e0350f8f22fad7826cf1211071ad7c6980ff7381ca0684cc5e0635136eabce2559ade001125a4b0b0bfcd4fb73188673db443d143d459b97480f2285dbdf37beb91c7478e0e4b154cb5c62c8cb55fdb1329bb85e28fef3ce7d5eee3d3aa714eca7e8e963a73a263866f9c95abc3bade7df0688c4dea7caa2b5d64ae6d6da846ccad1e1f7498d8e10a057a0f8dd08e8e97b547bbcc7851b7e0bdd958131a9de56dadec940477d4a6dd0df1f0220ea024f08233f2d61b86136351c998a8a326ff58b65b8e53830773af3cb7c9a4080fd45408f16dc44ae3386c6d0103fc6b8f601000000de18210f58fe3ba655841301577d242e2eb0f15f72d23dc6c2fbd534ccb7a3016d59112c332ece561bfe1c73033995bcfe2b6996020b8bed3df6f4dfdbff4446b1094093a4afd2208db0ebfa6eb20ff2b8473a02d9a0f6a1ca09624a27d4b501c1baf9bd3365309470063ec44f8ed079a88409e759678f18d27d23b09ba180407a392a5d07df4f39aff718fbed0f91e5a4670e43c863b76c0bf199f34016e9bca4722d6a25fda8fa47dc979c713634bd2c9858200dfc973efd5da5fd6eb00324f7c134e09dcd46910a609fb5ab0569f7b49690fe467b1b87da9b6569f9269b6ad89007aa41372a872000d5a1bdfc5d63fb4f6aec0400008000"}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x16400, 0x0) ioctl$KVM_SET_ONE_REG(r3, 0x4010aeac, &(0x7f00000000c0)={0x83, 0x8}) semop(0x0, &(0x7f0000000100), 0x2d) r4 = semget(0x0, 0x4, 0x2) inotify_init() semctl$SEM_STAT(r4, 0x2, 0x12, &(0x7f0000000500)=""/140) semctl$IPC_RMID(0x0, 0x0, 0x10) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r3, 0xc008551c, &(0x7f00000005c0)={0x7, 0x14, [0x6, 0x8, 0x61f, 0x2c80, 0x8]}) 15:50:42 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x6, 0x0) set_thread_area(&(0x7f0000000100)={0x4, 0x20000800, 0x0, 0x20, 0x5, 0x8, 0x1, 0x7, 0xffffffffffff8001, 0x80000000}) ioctl$KDENABIO(r1, 0x4b36) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000080)) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYBLOB="b1000000c6b504090a869474baf922e2f63724d537dc54de767689ee7e510e3cff61974f1ea79481a2bd24fbb39f29c1ead880371f5812d750a94154ffdc32f6f5e8f1321d5d76a85825dcd08e4cae4d3c08ac72a584355c72430af030f06231af915b9da9f71f9a4cccb3608498a0848cd1f4ddd3b507190353b2da55b4aeb511964efe96755df37f1a6ab6cc7228d536434e6959c5c4226f66b4f2893299d4b6ad19a7ab53218197b660f742c6b4e31046a9d2ab"], &(0x7f0000000200)=0xb9) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000240)={r2, 0xf6dd, 0x1, 0xd932, 0x40, 0xffffffffffffb480}, 0x14) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x1, 0x4) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xb) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:42 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x60000, 0x0) connect$unix(r0, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') [ 1745.583861][ T8709] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x2, 0x0) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0xfffffffffffffffd) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) r2 = dup(r0) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000000)=0xf6eb, 0x1) 15:50:42 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000008c0)='cpuset\x00') ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000900)={[{0x7, 0xd383, 0x8f47, 0x100, 0x1, 0x800, 0x5, 0x2, 0x0, 0x5, 0x8, 0x7ff, 0xff}, {0x0, 0x5, 0x75, 0x1, 0x51bc, 0x1, 0x4c, 0x5, 0x5, 0x80c, 0x800, 0x7, 0x7}, {0x33, 0x800, 0x1, 0x7, 0x3, 0x80000000, 0x4, 0xdf, 0x100000001, 0x3, 0x1, 0x101, 0x7fff}], 0x100000001}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x4000, 0x0) sendmsg$unix(r2, &(0x7f0000000080)={&(0x7f0000000100)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000000840)=[{&(0x7f0000000280)="c68459cd3e434fbd8a7c5e19e922b262562aad62ae56c761de9372b57d66a401e83c837968ae1928426a1c747f117cf9b8136bfc81a4f82e83b7ae5a7501cb5c3f9bc93cfd25d8fd09a132edf90dd3d9ef42c18aea7c4c1158178390a7f0c3bfe34e38fa44b7279e20d220471d38bcc379884c69de2304028fe7f3534f3d57063b621073f3412c7ccff9fdc7bc0564cfb667b3ac34fffadc7a90cbfa76a0cb2dccac0abbd21eca7b216b35b0aee8b0d30e8ae4bf4ec4c0b9f823639fd54e052e424e646daf13f266267221b9482576a2", 0xd0}, {&(0x7f0000000380)="24316fde93b3ab8e2543870b124032c5e773e45e17708b95b27edffcde70ee64082ffde1b215b20f8c7e57b8b6bc7f53ef3a43c52ac6b24bd3e9bdbd085a80618b85626fab4bd3770219c39eefe357bc56de170aac13a54876bf87ed3976a236a65c5fe63efd7a467152f68806e837647a3881058f7da15e42dc17bff057f23bf3fde8fd593429f945c549b7152def1ef481df643e437674fa38ff15a08f719be74781bfd410c65756a48f7bc7b3a979ae9a8d038c9f39df13ed9b0a0b67bffab1f780122059a3ae05e1bf5816a90c1b6262459549db100628eef6bb35e3981e329109", 0xe3}, {&(0x7f0000000480)="7b30f9d21e4f64c697bd7e940571d960a47784206d04652585151950bf5a9b39d1cbceed2a2b70a07a98f117ef16bc50ce90d5f892385d6a57e93bd248f7484aceaa5b8bf9a349480b85db6199517570e19d4d978c1f1870db4e1d44c7d87442f066550d30f46986d5b8b1c81a9bff88069272b07da1e52534fe8fbdf113bbf82b52e0ab4d8c00fc80befd06871397a238a85a2c05b1177bd1d7b2a03c9ac29a8b1ebee38ae88575b1c079364ca588d59243e36777ac0d40da51cc4b494143d1b62bf260dd01fddc13ea049561a9023f2d3ad768218934db1fa5fa5392bb86434d945414b9", 0xe5}, {&(0x7f0000000580)="31fcf8d6d07d1cc28c91a713b59948596a9606deae57ee605fa0ae18b1b59e831c9262eab9a782eb06c34e328fe1c8ed12019ba2990801c154f7c6c2787440c836f8085a7c3c2a95379987d352f9e2d85426ccf011cc904d1bc90776c3bf04097412bb599cc418b37f7e58433bccb1d32dcbd39f21524a98d380739b9dbb6267d448fd31372dfee663a9af7b84d34a4669f9e920a7ad4eaa162bd5fabc90e117eb1c72741b0984", 0xa7}, {&(0x7f0000000640)="d1bfa72cfdef6088edfae8392949b1c527b1e5bb6e97cfc111f666676174e65f087ca0934306d63c46dba6f8f05b4c955da605678f65fc312fe456f554e9192ceb7a4e17779f12b947637c9fa77c869f8dcdf027726b4099de7b58223928a190706cd3aa4f3be224f9e0d329b246bbd157f1cacac637785f18e543ec9a64d559d8ad2d52450f1e03dae3aa8db848425c68deae56957166c19b28a525a73ba067e561cc83db00c3e7f0896d9d96ce443c7b472c69a2eef3b78912865ba8a15344b7fd32f8a39d27a7a3c4bbb4aa94e4795176939f934991ac5fd911fbb2", 0xdd}, {&(0x7f0000000740)="a0e0a003e1e77ced99bc8cd367d0b13297d9a6f573c4de5a10d93763fe1d3aec23683219fb380127eebb6b645353f0e968ca63f07508743cea874c5ea90ae7fe5db4d1fd2c4ae5ec05d9cedaa952da3b6c38700a1918be88", 0x58}, {&(0x7f00000007c0)="a580f7eebf46db47eb8cc4638cee21f711ee7f3bf9d839064e13f75d10c0ce761342e024e1cc927f07a24343f23a1b161abcc5476073fb55591f00fc5b5b46865bfe45899e38cf9dd80ba18945aa612786bd5090c7bab6ae2b2e58fa23993b8daccce58319c48968e231b51761142ee42c69f5cff47b", 0x76}], 0x7}, 0x8840) getsockname(r0, &(0x7f0000000180)=@hci={0x1f, 0x0}, &(0x7f0000000200)=0x80) bind$can_raw(r2, &(0x7f0000000240)={0x1d, r3}, 0x10) 15:50:43 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) r0 = accept4$unix(0xffffffffffffff9c, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e, 0x80000) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000000c0)={0x0, 0x0, 0x1, 0x0, [], [{0x8, 0x3f, 0x9, 0xfff, 0x5}, {0x9, 0x6, 0x7f, 0x3, 0xffffffffffffff80, 0xd873}], [[]]}) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:50:43 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) r0 = syz_open_dev$sndpcmc(&(0x7f00000008c0)='/dev/snd/pcmC#D#c\x00', 0x800, 0x100) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000900)=0x1, 0x4) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") select(0x40, &(0x7f0000000000)={0xff, 0x9, 0x1ff, 0x9, 0xffffffffffff0000, 0x3, 0xff, 0xbb96}, &(0x7f00000000c0)={0x4, 0x8, 0x2, 0x3, 0x8, 0xffffffffffff00d3, 0x6, 0x80000000}, &(0x7f0000000100)={0x15, 0x7, 0x7fffffff, 0x7ff, 0x87, 0x1, 0x1f, 0x4}, &(0x7f0000000140)) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x4800, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000001c0)={0x0, @rand_addr, @broadcast}, &(0x7f0000000200)=0xc) sendmsg$can_bcm(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x1d, r2}, 0x10, &(0x7f0000000300)={&(0x7f0000000280)={0x7, 0x0, 0xcb, {}, {0x0, 0x2710}, {0x4, 0x3, 0x4, 0x5}, 0x1, @canfd={{0x0, 0x0, 0x3, 0x2}, 0x37, 0x1, 0x0, 0x0, "73e0ead80eb731b73ee03d9eb5c735e9ee024bec84234dea1a38b3cc56d7864eefe78adf3f0a594c59c8033989d1e8abb992514a3fdd2a380897e1f15102ee2b"}}, 0x80}}, 0x40800) 15:50:43 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x40000, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r2, 0x4040aea4, &(0x7f0000000380)={0x4, 0x6, 0xfffffffeffffffff, 0x6, 0xfffffffffffffffd}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:43 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:43 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000280)="82fbbb16ac26463956aa06bb07f3665c", 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uinput\x00', 0x802, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x100000000, 0x101) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, &(0x7f0000000180)={r0, r0, 0xfffffffffffffff9, 0x113, &(0x7f0000000400)="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", 0x2, 0xfffffffffffffc01, 0x200000072aa, 0x3460, 0x6, 0x1, 0x81, 'syz0\x00'}) socket$inet6_udp(0xa, 0x2, 0x0) splice(r2, &(0x7f0000000080), r2, &(0x7f00000000c0), 0x40, 0x5) times(&(0x7f00000002c0)) getpeername$netrom(r2, &(0x7f0000000340)={{0x3, @netrom}, [@bcast, @null, @rose, @remote, @bcast, @rose, @default, @netrom]}, &(0x7f00000003c0)=0x48) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xffffffffffffffff, @loopback}, 0x1c) 15:50:43 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:50:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x10000, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 1746.370076][ T9193] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:43 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) r0 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$TIPC_MCAST_BROADCAST(r0, 0x10f, 0x85) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000140)=0x68) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x4, 0x400) write$ppp(r2, &(0x7f0000000040)="f3e7c6f405627b6b0f2c636984279d972fce368d1d489643ace12324949e55b5b015e980dc5d0401182d96d982e4af5d00770cb5cfb99a58fe9aa11c6c6314b0", 0x40) 15:50:43 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24, 0x9, @dev={0xfe, 0x80, [], 0x21}, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)=r1, 0x4) ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, &(0x7f0000000300)=ANY=[@ANYBLOB="05000000020000000100000000000000050000000000000007000000000000006d0c0000000000003b08000000000000010001000000000009000000000000000104000000000000ff0000000000000003000000000000003b69cc6be7d0050035175287d30597a24fb1808b22d39515fbad3e21b6a9513ecfed1b09bdb978bb8fa4aacd19b2a211b3d50b7072e9a1a6d1a9fadaa325628c2e06d9ccc010008f1de92d5730de8cbe42f8cbbdca416f01e46babf95e98e931d6771677b497ca6b"]) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000140)={0xa, 0x4, 0xfa00, {r2}}, 0xc) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000003c0)={r3, 0x20, 0xbb}, 0x0, &(0x7f0000000400)="51c306ecd37f6bc5f4f8f91cf1c1d41047ba89feda7b753b409080f2a280fa7b", &(0x7f0000000440)=""/187) 15:50:43 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x20000, 0x0) getpeername$unix(r1, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000540)={&(0x7f0000000500)='./file0\x00'}, 0x10) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000440)=0x7, &(0x7f0000000480)=0x4) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r2, 0x7fffc) 15:50:43 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:43 executing program 4: syz_read_part_table(0x0, 0xfffffffffffffe83, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:50:43 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video0\x00', 0x2, 0x0) semop(0x0, &(0x7f0000000100), 0x2d) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vfio/vfio\x00', 0x2800, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ptmx\x00', 0x0, 0x0) write$P9_RCREATE(r1, &(0x7f0000000800)={0x18, 0x73, 0x200000001, {{0x8, 0x0, 0x14}, 0x10020}}, 0x18) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r3 = fcntl$getown(r0, 0x9) fstat(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f0000000680)=[0xee01]) sendmsg$unix(r2, &(0x7f0000000780)={&(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000140)="630f0214e5801e2f468b96ef2007ef8070ff15e97b861488ac6192b12b9a30799f8153e93e988788b4bf6606c265c90b4e34b24464d092f527dba5bbff6ee11b5f4e4633e53e65f6d669d3e64e5faae9a41ee14c5301e663e124f4a8c6c919ac2bf2b3ec727b8e11d09e0d806539000d60a7c4e67056140682b42bd442d68693547e13e7cdaac09f6679ce05a17a0c46611e586660300df14754b3eb6193465f63c141e6aee50d9781ee8305945fe7960807ae6851e0b692ca47f5d2dda3a9ec4aa7f9e15b80c928e8a1f16cc3700845f83e0043113274", 0xd7}, {&(0x7f0000000240)="301487465013f006b818f729ffc5ab1644b96841f931e5e6cc1579255a9ab3bd6d62fc215693ad8200f90e68da77b91887336ed8a6719612bd5306ad9c5d816f37f40548e0640dcabdb77f158f3a4ddfe66df63090e816dbdd23515e54f6ae90465bb6455b259196a8b2fe8677317604925b6d89a9cf17e0e201c136e6472f92c0e7bd6f0a6ac76dcddd1c088e9580fb0c7f48a89720e6c1be79082d44bffc6c5fc2ae919b6b1bedd98028925750e17883ab09cf5932847e754f6d9081956260cf5564", 0xc3}, {&(0x7f0000000340)="69b91ca0a76d9559674ec93386d7900fb9d109a42334b5b7d01a20381bfd2c2ab1a6c23b6615689c53845d6313d08b70e05009754c6bac2d926cc98e03f33e3fd215879787bd1397a5996285c9385b3a93cc64bd1a0f57969e2efaf31769b805e6b4a0666d78c0fcb6202181126f80ed792ce8eb9387ee164173b8304311b1de57c7d0199266afd32605f29b79e14b3d1a905b0c2697923e589b55bf6697591df582fa782c4fe18365dc2850fc68cf434bfd6e9aacfdd1fd156d8d32ee68610dde1af4c881df652cd2c681e0eeacf07a6adc57486431903af712ac3719792236a23aaafc118fb5f87f63732127789cea9fcd32", 0xf3}, {&(0x7f0000000440)="887e2c86338219eaebb881cab15a8ed38757ff35471eb50ee61d114b0670a18ed1767d5bf790fd9f83bb026cbe7c1fb2458555dd9b86711c0b8cd1758c32927b1bea517f58a0399963e0eff337d7200d0a13a760726a091039a05e2a7ce8c794ae5bec5985c3191097bffcd5b312a228a6d98522348e53ffffc10d951df146240a8b44abf2ff25bc5bcb94720e436b5cb0d7b833df7ba04b56aa1d580be14b07e7b49757197ae1caf53c43d2a95236265c3e549c54bd015fc93f04", 0xbb}, {&(0x7f0000000500)="9e87e99541d33f247153fc7dc54cf77c0386758b159ca1fb0a94d9f7209c6efb761d3de69c0aba8628cf11fd442793d65ef36cde1add80a268a96238127f5efc5a66866389c5be2a67839d2d80488030c4c8ecfe83bee2a10bc3ba029863cb7291741ab6eac01d048dbf79ad8bde282278302351", 0x74}], 0x5, &(0x7f00000006c0)=[@rights={{0x1c, 0x1, 0x1, [r0, r0, r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x1c, 0x1, 0x1, [r0, r0, r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, r4, r5}}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0xa8}, 0x4001) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:44 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='./file0\x00') 15:50:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x4, 0x149c82) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f00000000c0)={0xc, 0x6, 0x8, 0x800, r1}) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f00000010c0)=""/4096) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:44 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000000), 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:44 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x20440, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000080)=0x2) 15:50:44 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0x2, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:44 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0xc40, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f00000000c0)={0x1, 0x20, 0x4, 0x7, 0xffff, 0xfffffffffffffffb, 0xffffffffffffffff, 0xfff, 0x0}, &(0x7f0000000100)=0x20) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000140)={0x0, 0x8, 0x8, 0x0, r1}, &(0x7f0000000180)=0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semget$private(0x0, 0x3, 0x118) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:44 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2, 0x13) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)=0x0) r3 = syz_open_pts(r0, 0xc100) r4 = syz_open_dev$cec(&(0x7f0000000880)='/dev/cec#\x00', 0x3, 0x2) r5 = fanotify_init(0x8, 0x1) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/snapshot\x00', 0x10b0c0, 0x0) r7 = socket$rxrpc(0x21, 0x2, 0x0) r8 = gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001340)={{{@in6=@empty, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000001440)=0xe8) r10 = getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001480)=0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000018c0)='/dev/cachefiles\x00', 0x80, 0x0) lstat(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000001580), &(0x7f00000015c0), &(0x7f0000001600)=0x0) r14 = fcntl$getown(0xffffffffffffff9c, 0x9) r15 = getuid() r16 = getgid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001640)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001680)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000001780)=0xe8) lstat(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r20 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001880)='/proc/capi/capi20ncci\x00', 0x400, 0x0) r21 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001980)='/dev/vsock\x00', 0x200, 0x0) sendmsg$netlink(r0, &(0x7f0000001a80)={&(0x7f0000000040)=@proc={0x10, 0x0, 0x25dfdbfc, 0x64e064702d93389e}, 0xc, &(0x7f0000001300)=[{&(0x7f0000000140)={0x708, 0x20, 0x600, 0x70bd25, 0x25dfdbff, "", [@generic="1d8d2c4d52f6a1ed7c6ba00bb17d3ae38ae2278c53086b1a641ec1f4b95bcc62a428bcf8555f5df0a565d7c7c2b3f727f4ace947704d68f8839757444c5a4b4db30fbed177eef9a2a2bb946be54d9f15ef5fea6cb227d46b71a2468aab1f6422be4e819a898dde34548e2ccb6d970cfa27f40162ff239a13dd6842499f33911b2f52750867b92c31a3b6eccbf3a880e8523c8cb7274dbb8b", @typed={0xc0, 0x5a, @binary="ba32eb0866421da1dee36b267b724511966e2af7eac84ca8627a0defbdd6e8b8f1a3e7b4c956eade496d2f63669089cbd101074ada89bb050987fe5db050fd37f26ae0c92f8661ce2d9e450301cb195281971236d22abe7fd6870e8eb48c35226be6b3a321dc9e0d0cfc65e364f1358b88a26b8fdd3df837f2c9dac27b7e0b1eb88680bfe786f8e4c1299e1c94dee10225175edcc3e6b6638f3f4b60e1786f74ddae105d4cebb766386208065de4b17f82504692a5e362bfc0222b5f"}, @typed={0x8, 0x4e, @str='lo\x00'}, @nested={0xf4, 0x5a, [@generic="eaf4d843d9f5bd86a51daac74ccb20fde708cab1dc6b1cef8073f7dda90a26a0a7598d534df74cda631c61e2141563664073de599f139c8d06d993018bca7f59e877f16a6394d8e34116959d1eeb56fa6a5bae322b3a2bd874d0129fbb71f70dd7acc2b84dba8b2634795e7061a6d7288399e8bdc504e7b9f88dfb54f89dc59cd6f23a5459aab4f67041576ef696d6878d13d16a7a4f035e3a6dad70d7515a20aa6bf219b9d91524e2eb8ceac95df3c9cc9e6b5b3ee7ed0a1e40d82577b28460f696cafbeb65734febda8d715447c703", @generic="2276114a0c6752a10b44d75fb8fba83742cfd99f7b71ddccd446e780214f"]}, @generic="a06542850c1ca4d56b08f1dd65b6409cdaeccd2e0a9f9d6b8b5beb7436c1bc9bf7d01cb1338f651a15b4c3a3953e4d170c28b8cfff3f456fcca3adc85c3cc573a0ec0d3b3a4e891309e880d50887fd897804355adc88731c8f69ffd4e815435e016f8fffd8437895c0b8fe3363aca44d65bd", @nested={0x13c, 0x19, [@generic="b561cda3de63c13085be1d32bdfb418fdb07c2054676b2c0e75c5ee0e23db4d6a57bd51cf90806b08165e15f222fef8edf5a3825ec172b109425a1a744fff4d9217c20699fefb3ec9335a3e6afced6266ab8ef38eb4111abb9efa638e62f243510ffed318da16d71a0a8267286836f542cb02b9d7f2ed3", @generic="66b3fec608a49c2634cbd406fa8038642425785942cda6341ce44ea3c4a22595528feac226e0deb86fcaaf312fb6fb474e42a1d8c60107fcd8488c26103d7678619f7a0acda1561d6a0d6a4f818f8b0171860f881c5ff0d29b170153bcb026ea822e7521eb061ef501e717fff1b472175e39eac8c1581c53bff6351d820ac460e0b6e63c2e5e81b982acd7ce22c882857f874af45217c5adada806fbc5a3449a21837331d99a2fefa3500c1f09b44b", @typed={0x8, 0x40, @ipv4=@loopback}, @typed={0x8, 0x1, @pid=r1}]}, @nested={0x204, 0x33, [@generic="c1ad26dc07469e184d244e3a0ccb6948b693eb6e9fa930793d65a357b4420ed969798ebab3e3a1cef9db67367eadff9954dace7cb48ad7ecdc4310a60a875e69b8215d763b58adbf92e5499557eef116c59d0b8d2126038f7ce91ad71ab385808c22cb442cbeb689bea10b420f51db6ef6e8771946e4afdec71b814dd71a9b2241107030bce57f481c56d6738293d613548eff551521231ef8921c2edc60942b6288e00ac22ff1b79c5d40cd02d36fac855c4fed707129c4829d1f7923844b258a456aaa7252ac16139195253248e486b9c5b8b2bae9e25484d8ad2d1af78cfa2f63123424fe2c95932643b5b1b0a1de9e", @typed={0x8, 0x5, @pid=r2}, @typed={0x8, 0x3e, @fd=r3}, @generic="48d3e26b6ccac7abd7929bad74e61fe23924c20138967fc3af0ff463d6adeca87e7b414996a1ddef28333406a2a0a103fd7068b14e4f865242da9e7ddfda4861ac261aed7b06bcc83d2f56fbc60d68143a36d8c01000e2aab69c22b975b960", @typed={0x8, 0x8e, @ipv4=@loopback}, @generic="a3b7c61382171ccae700d5e0a4c7de36a5fb91ec79c854bafa98fbec18e0fac31c3a64c5e7c11d286fbdc622ba0b40414fd47261216d97a48e10a4ab35ad8d582835fc973902f81581199e8e19c6e063d5b7dca12da59e9306ac42d000e6aa9854c9bc3c9e05aac3305c8f1978004d59141b3cfe1e4a053da2ee9b796236bbe1dfa0ff7013ab4d93463d522c6ed4a4e5092447ae5e4d172a"]}, @generic="abc55a2e25bc9c86e16f038d6d04efdffba04507813ffd8006299785d69fba01f1afe1ea4a481c34bd8a4c4de8fd255f1fbc10e24db9173c5dcbcfc8768560cd4048ff69b6a6c47ef29586fb6127b9e54e735b289ef6a4f686a57add8e8c031fda4c234457d69d168859fe6396c8dfb42f2a24919f4d2d8fb2efc628c3d56e5e3f99c5245472fda9517f5e12e912e98a11b1b6eb88e5423df342d1dbf442234347afdcd7856e0e8bfb1fc379dab3e0eb12a21e25a69f0de5db5e558346ed9bb4c1d029371020ba3624bd847c11159a8255258fe600ad75edda343122d99f91f0bb7b00e1571b440df39a7b8ad340755e48ff"]}, 0x708}, {&(0x7f00000008c0)=ANY=[@ANYBLOB="94020000250000012bbd7000fbdbdf2508007d00", @ANYRES32=r4, @ANYBLOB="08006c00e00000015bdf8f3c0194149baed646bdb1d454ed65d543e89859be9a54c1f36ff37c1f3cd411a9c00e5e368c6fde3b696866cef180902606f6d612dcc3d1c0ca3c00000000000001ffa82e8389be06d540ac2c08005600", @ANYRES32=r5, @ANYBLOB="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"], 0x294}, {&(0x7f0000000bc0)={0x30c, 0x32, 0x200, 0x70bd2a, 0x25dfdbfe, "", [@nested={0xbc, 0x18, [@generic="414047e8cf3d", @generic="f3c37fc8715cf54f19d0568489824f361f1fc100cd8800616a0686711b5d09f52af0c932f750134bdebac9abaf862f3bd8ae668044ff859d1cae04cc886ae2901cdc2a1dc079b5797764ed9fd82c52b3e976ee47cdc1f71ca90b062b0002484be2196c1369a994801126b1994c36ebfb0757923808e40256b2141d6154954cd1bf19039dec3a9a3a5c1c3c5d67a0fc3e5cfc4c676a26dc2f953ff6eb5d47e76362549879e23375", @typed={0x8, 0x7fffffff, @u32=0x6}]}, @nested={0x240, 0x73, [@typed={0x14, 0x40, @ipv6=@remote}, @typed={0x8, 0x2e, @ipv4=@dev={0xac, 0x14, 0x14, 0x13}}, @typed={0x4, 0x52}, @generic="2126c13c8e80bce483977055ca1b548bb13599cbda0b5c2bd7cccbc09d08e9c4ad263f5ce1404811312e7d0e076fb48cb6e85ffb52f9d429baacd22034e99b60943aa441953cff87b36ffb0ddbed525b5e4c887714da59d50fe2938d5e32ee6ed77d34ed5838fe6e901e797a0c4cdbfe2c69ec9dfe48c9135750cc45574da83a8dc3e797128bb044495bbf8938388de62bb3911d841316b8fb25a9d8d07b874c0894e95f5be61eee82cf734607d40ed8cb7db6b8cfe7dcc0619a8b21a5306e18c4fbda6be77ccbdfe89f4a0db91c60fd4e23e9850cf38e96be33", @typed={0x8, 0x64, @fd=r6}, @generic="829426cddc9daafcbeb6d6db05c77acf870b9982e225d84e20cf3e79db01e60f794015c590240e88246e209c98336f550f2d9822ea9b5371b1667e6636353f01401f8b0dc7b915238c79db404c59abbcf4886040d9362e3fe358de5d9e26cee1d675a2bb06d924b4161b3f1502e09b", @generic="62cb103095629bfcfc5eb52e4e876075fe038f9c121e4c2aed6a87482a7d5dd63e60b5569e657d8d198e629efb2304256a38be67c8bfd91a12618499b3d4a92a76603a5e1869e5be0620d49c9866e6bd121e3326c2c2426bfd8690def8696da1b621a878b9fbde67eed590114cf10e50e359f0085b05a6b6218ef1f5e549d3511a12c7a9b5bef24042f5e3a3b0859410377b34ef2cb2eaaa3b6a8120c02fae787f8415c3010d505630b80f7a60f14d4c6d29067fe6eafe68d85a42a6ad33042d0005533761dc925a2a3bbd"]}]}, 0x30c}, {&(0x7f0000000f00)={0x3fc, 0x26, 0x1, 0x70bd2a, 0x25dfdbff, "", [@typed={0x8, 0x24, @ipv4=@loopback}, @generic="66522b40be10918a594de2f64b712db868e118686bb4d5debba1f8dd3da6c65f7d056f7d6eb81c53fb7e487de63fb102d64f7d0a27fb16ead90abf22568de9516a1f1100588b1ac61447502eecbb59a896673688a94fa936959dd3173f1f432cb7df61c95ffa32532bafdf6a4650a3364836b2f803cae3067ce2757a7985d55aa8b098891ce6d6340f96c33b35a5a9f00bf2ab21969914b249a8519c2914d2267ff8da180c8a0dbba9", @nested={0x94, 0x43, [@generic="b0f32e88fce8bc3ead84ee62ff3b5a068a8903cd09d48475cbe8d964e1", @generic="5de952109e819b0433b1e6c54104aeae2b3ba9c7099767c3fa59a29163dc01b6570d9d4fbdeafd1df0e6d683963ad6d21d43c10279243f99c260009223a667f0d1e21f1aafc86e7f8e7ee183c7967a3a520608479022205e1372e6c89f9c90", @typed={0x14, 0x57, @str='bdevsecurity/:!\x00'}]}, @generic="cd0632afcedc30876630cd566f0061ca0299dae40bd1919931cc6d6dca8d2cdd6459fb0c51a0569c4af18e7a21941f7412ae5a69488309fc03dd1880f85ecd1bd04884ae960d29a825bfce597d9936690c5bf5b17d9707af7171c5ac380d3d0bf94c324dcffd1567290a013fabeefb71f1c529ac296664d791cfbed1e071501fb3f692e50874c0f61267c1ce22383207d427069e1103dfc391e7d7616b5a523c2ae21b675cb2b4d2d1441a19d240db5c86cb1b0fab9f141bb52c6b47c7d0e3a800d8", @typed={0x20, 0x5d, @str='#+[-proc-[eth1cgroup^bdev\x00'}, @nested={0x1c4, 0x89, [@typed={0x8, 0x8c, @u32=0xfffffffffffeffff}, @typed={0x8, 0x42, @u32=0xfffffffffffffffb}, @generic="5118c936b76eb9a0adc96ed6d893cdeacffca94b1c754f07d0e8d38389a2915170112a9b0ec4454252432c5290c76aeb1870ce745c624ac3dd5e5895e11877efe5d0be135b042b461b6b1fef90b4f164186e076af37e86797edd7fad7aae3788e1a1f474bca82f290cdbdf5116a419799009d93b9acdc7f59f38fb2bb810b1da15e3539e6e3bb8e7ba547beca6bafee064356a48b5efd610c5552ef519869b748c0ff90c7af9a30c945b52c83a1bce46032be93289dc6a33808458c883b6", @typed={0x8, 0x88, @fd=r7}, @generic="90f90437f4bb6316bdd3420ac7b70ba53f6f0e0ee6e3ec633d5061ba01e6548119b711699a30a49789dba737d749688544f263fcb36bd18a3eb451b9e24d55cb531c3cbfb64ac2ce288249be5b6d86607aee73eab52e7b2a719dc3740f88b120d00ef9391b13733b60eeceec9391ccda3dd4a60c3027f365c4896338887750b0d258ed4010fdd8b49ceb5dfd7f7e90f6d3606600d027cf1b28703bf5cfcba755b3a3ce25f1b33308debc69979d7846acda21bf4963d41f485dbaf9118e4b107ff0af9420b950ef69c5ecb253", @generic="6f2eb67b02bfd4262c7f38f658318a70fd01bf36272309716bed21870bfb"]}]}, 0x3fc}], 0x4, &(0x7f00000019c0)=[@cred={{0x1c, 0x1, 0x2, {r8, r9, r10}}}, @cred={{0x1c, 0x1, 0x2, {r11, r12, r13}}}, @cred={{0x1c, 0x1, 0x2, {r14, r15, r16}}}, @cred={{0x1c, 0x1, 0x2, {r17, r18, r19}}}, @rights={{0x18, 0x1, 0x1, [r20, r21]}}], 0x98, 0x8000}, 0x80) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:44 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000100)={0x34, 0x0, &(0x7f0000000080)}) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:44 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) r2 = dup3(r0, r1, 0x7fffc) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000600)={{{@in6, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000500)=0xe8) recvfrom$packet(r2, &(0x7f0000000340)=""/174, 0xae, 0x42, &(0x7f0000000540)={0x11, 0x15, r3, 0x1, 0xffffffffffffc5b1, 0x6, @random="4d8a70cb824e"}, 0x14) 15:50:44 executing program 4: stat(&(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x8, &(0x7f0000001600)=[{&(0x7f00000000c0)="080d8fb6a97c44dca77e998e2f794d225ffd6f0b19fdd475780462a5a0f94aa4e8fe0f04ab175df5e5808b521a867ee8d7ae36ecf48e53ea0f96509a18dcf4cc502bb09f5a25c584a02bb3967b9fd31902bd56299b5370161ae3a03b98626c7667c4c15143f2541fd461234c00acbd7e2031f3162375c336fcac829e4066aff4857393fe92b79d1a388347fcf48d8c", 0x8f, 0x80000001}, {&(0x7f0000000240)="26855b67677e43d4bac4bc01790d73d1c21d95dcb75c0c3a11c6327a2c838d61667a17cfc2572bdb9211990f12ca524e2828096d1109b839a1f81ec822867aa42b0d9e8e509ff5f866d384d9afc8c6c13ec89c97242fcbd6da13b118f70792306113f2b47593086a92b8d84a98f8772447c0c006a55bc28a02dc8ec6bf7c5fd63356bce015e4bbdcefbbafefd147955a107da4997e87dbed0ce85895b6a320add23a5296be0f800f97562a3fdde8f0ea98487488fe89306e876069de1ef45c236094e9db27aa11f2a7d414bec506147934aefcf66a6d5c01fcabe9b365af8376e16b07d1477c89a6ad07570a9e2a", 0xee, 0x2}, {&(0x7f0000000180)="8e26d8d5d0f0bc1bcbfe5c744385628ced498884bd8f1e3f29d8248e9f7ab50f1b89853c41be21fbb89d72589e16e3d494922ad0dae62efc02d15dbfda1e15aff434", 0x42, 0x9058}, {&(0x7f0000000340)="a214ef112d830c0e91e7c00eb61e4c213f28a0345c29291279f2c87038450308b501b9210f5338963066130edb47930457538442d832948c7194df01a3943ca435ec405ec39043be46dc27cde592e962bacaa00c8b", 0x55, 0x3ff}, {&(0x7f00000003c0)="7d2f44a0df45418a04f49abbac67d28cf83e84db4088fc92eff96c6c50ac77fcfe304b00084318387c1716125a63d003a1f922185574cd71ef17df2ebc9a7b8d7d96539df0b41244000baf94cbc3a569f76cbe2258c5646155e3f34c98f114650f95836b1b375b7603866f4be2e04f9f8727da010160074b46dbe72a71b040f2072fdb13177c91f049fe92021450d7", 0x8f, 0x6}, {&(0x7f0000000480)="12b35bc3f00aa3bf39ce0941785f7b5fe9ba293eb83153567ebe39a75296a27c9afb6fbe37e59f9cfcdda3a788a6a6e30916eee613f3003c42fb6399e46d5ec65c21196b105deaa16f41c2abd319aab01d6a442e9b835e314fcbbd451146f5f897648862876963a17210a087f10a6a9504f2562a125fa679002e571ac768d0aa1c1c9eb50d92c33e97339febf3f96f48f2", 0x91, 0xffffffff}, {&(0x7f0000000540)="bcbe36f15ccacd1a140addd68fb939045a5ed938fc1051bd2c9f07b07551f58c0b2230d224cca11f2d58a16538eb7177a349037c31d9d4fbb77f23d03488dcadae831d81f44ca5e3d76c648e3f3f03b034700301ab1352af1f5a99ac31862a75a003264581747d8d9c32b1f8b198c7b8ddda4d32931937c0bab3cd8e34f9387eb75c80baeea137bf8b1afbd3fc52b2f302be0adf84ec051fb9ffdc760f77c08b7d1e5d98c12f684558ac070fab9eae9a9a7a7cb901f0f02cfb00990c5fbcff", 0xbf, 0xfffffffffffffffe}, {&(0x7f0000000600)="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", 0x1000, 0x5}], 0x11408, &(0x7f0000001f00)=ANY=[@ANYBLOB="709377e93bf102cb6330303030303030303030303030372c6e6f626172726965722c6e6f626172326965722c6769643dace8d2be8a70481a79184156068ecd58a4639c1d37ec5455c016fb1714f62cb30410da9c1ef6b21e40b68a5017df35ecd4ca60bf7a7b279c44e8aee219ad0877b421b93b9076ea37ca00d03a8bacdffa5ed175acbcb2313f979a16cd21fe25a298b41aa4a58dc7ee92f5ba5c205cd2e48a0a148199371d00a968ceaab4e05b624a507bab11a6a1a1aef948f6fa8c243587", @ANYRESHEX=r0, @ANYBLOB="2c706172743d3078303030303030303030303030303366662c63726561746f723d2e2df3562c706172743d3078303030303030303030303030303030352c726f6f74636f6e746578743d73746166665f752c7375626a5f747970653d232c2d62646576272c00"]) syz_read_part_table(0xfffffffffffffffd, 0x10d, 0x0) accept4(0xffffffffffffffff, &(0x7f0000001840)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f00000018c0)=0x80, 0x800) recvmsg$kcm(r1, &(0x7f0000001ec0)={0x0, 0x0, &(0x7f0000001d40)=[{&(0x7f0000001900)=""/25, 0x19}, {&(0x7f0000001940)=""/166, 0xa6}, {&(0x7f0000001a00)=""/159, 0x9f}, {&(0x7f0000001ac0)=""/243, 0xf3}, {&(0x7f0000001bc0)=""/170, 0xaa}, {&(0x7f0000001c80)=""/177, 0xb1}], 0x6, &(0x7f0000001dc0)=""/246, 0xf6}, 0x2) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:50:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000000)=[{0x1, 0x57}, {0x6, 0x7, 0x1000}, {0x4, 0xbd08, 0x1000}, {0x1, 0x7, 0x1000}, {0x5, 0x46b, 0x1800}, {0x4, 0x9, 0x800}], 0x3c50f5b3618e2) semget$private(0x0, 0x3, 0x200) semget(0x2, 0x0, 0xb1) semget$private(0x0, 0x7, 0x8) r1 = semget(0x3, 0x0, 0x0) semctl$IPC_RMID(r1, 0x0, 0x10) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x8000, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r2, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0xa008000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x8c, r3, 0xa00, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8541}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffff8}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000001}]}, @TIPC_NLA_BEARER={0x38, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x4000}, 0x4081) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f00000002c0)) 15:50:44 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000000)=[{0x2, 0x800, 0x1800}, {0x0, 0x8001}, {0x0, 0x3, 0x1000}], 0x2b61) semget(0x3, 0x0, 0x1) r0 = semget(0x2, 0x0, 0x5c0) semctl$IPC_RMID(r0, 0x0, 0x10) syz_extract_tcp_res(&(0x7f0000000040), 0x7, 0x8) 15:50:44 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x4, [0x853, 0x1000, 0x0, 0x49e]}, &(0x7f00000001c0)=0xc) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3, 0x2, 0xfffffffffffffe00}, &(0x7f0000000100)=0x14) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000280)=0x0) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x3, 0x6, 0x5, 0x5, 0x0, 0x9a53, 0x100, 0x4, 0x6, 0x401, 0x401, 0x8, 0x1, 0xdb1, 0x6b9, 0x8, 0x4, 0xffff, 0x2, 0x3, 0x800000, 0x476, 0x14dc, 0x6, 0x80000001, 0x5, 0x1, 0xfff, 0x8, 0x8, 0xb5, 0xa3, 0x5, 0x1, 0x8, 0x80000001, 0x0, 0xffffffffffffffc1, 0x2, @perf_config_ext={0x4, 0x4}, 0x1808, 0x6, 0x5, 0x8623aeb16101eced, 0x8, 0x3, 0xdf01}, r3, 0xd, r1, 0x3) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000140)={r2, 0x4}, 0x8) 15:50:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semget$private(0x0, 0x2, 0x2) semget(0x1, 0x4, 0x20) semget(0x3, 0x1, 0x140) semget$private(0x0, 0x1, 0x2) semget$private(0x0, 0x3, 0x81) r1 = semget(0x3, 0x4, 0x8) semctl$IPC_RMID(r1, 0x0, 0x10) 15:50:44 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffff9c, 0x6, 0x16, &(0x7f0000000000)=[@timestamp, @window={0x3, 0x6d, 0x5}, @mss={0x2, 0x1}, @window={0x3, 0x9, 0x1ff}], 0x4) 15:50:44 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0x3, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:44 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x101002, 0x0) connect$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x1, @remote}}, 0x1e) syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:50:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) shutdown(r0, 0x1) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r0, 0x80}, {r0, 0xc090}, {r0, 0x8000}, {r0, 0x2081}, {r0, 0x1100}, {r0, 0x240}, {r0, 0x201}], 0x7, &(0x7f0000000100)={r1, r2+10000000}, &(0x7f0000000140), 0x8) r3 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$CAPI_GET_ERRCODE(r3, 0x80024321, &(0x7f00000001c0)) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) getsockopt$inet_tcp_int(r3, 0x6, 0x4, &(0x7f0000000200), &(0x7f0000000240)=0x4) 15:50:45 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) r0 = semget(0x3, 0x0, 0x1) semctl$IPC_RMID(r0, 0x0, 0x10) 15:50:45 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@add_del={0x2, &(0x7f0000000080)='veth1_to_team\x00'}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x1c) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x200, 0x0) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:45 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20\x00', 0x4000, 0x0) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f0000000380)={0x3, 0x103, 0x1, {0x7, 0x1, 0x6, 0x8e9}}) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000003c0)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r2, 0x7fffc) 15:50:45 executing program 4: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x9, 0x1) sendmsg$alg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="a7d7d53761258fdb4324d10e6233b58f6b0eaf4fe9a1d00b9be63347cf8b3849d6f4f62b3c08814fdaff86c758213500ef43dde4840defd7befed3ec102a", 0x3e}, {&(0x7f0000000080)="dd6363f2ca2938474515b954cba60643d792ab86cdc276f230a52a796e1597b5c77eeff36f99317f4e3a132247b9c5ef2e5bef8fa80722fa26f2082b5b95bbad472b76265d5c25bd6e08341926995fe15112dc90ad919d48163e4607c43aa299fca14257ffcbfdff5ec8c613a16318a48eecc89ae3d0e52a32033208534b86487a43b0dcf94a", 0x86}, {&(0x7f0000000240)="1c946d9981618412256440178501c28fa9304675f0ded7376689e90dbb18e29d47ddf99baf04d2f5f80bcf9c8d97a2c6b6637ee272913c911792044348a0a282029beef03dd6305b3ad245612ab41463f9163e9160a9e63fdc6ac1fb803af6f1c9cb5370f124bc0488cb8e2fd0e7e1a366a1d73a74056bbe49e7aea721dc475c5ca705cf9919c283ff99c824a030a79e4ec74850102d04a530acc28573691c919edf1e50fec0fe74780d0f79656f4dbb1d32c54b667cf50a2c93c52caba613eb38ed90d743687a38b773919f769e7bc3fdd68cbd8a357c183d673151c38db45d0d6bf90bd4153eb8f2546097b5554d163dfdb2e76cc3d71e0913", 0xfa}], 0x3, &(0x7f0000000340)=[@assoc={0x18, 0x117, 0x4, 0x2}, @assoc={0x18, 0x117, 0x4, 0x7}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x7fffffff}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @iv={0x88, 0x117, 0x2, 0x73, "0b8dea323906c3c3d1840ee3a25f76de04386b582245998a6afc91b49918e178b0cf5f610c7c205ae4c8ac0542d9b11a486ca77a6f272ce64663bb8f5e44e12b667878f14be16fc266e9e89f330d8a767331762732786c4865aca1c16f82a7b30e45735d0ba810f450754e320dd00a6d761b7b"}], 0x1100, 0x8001}, 0x0) syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:50:45 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) r0 = semget$private(0x0, 0x3, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xffffffff, 0xa0000) write$nbd(r1, &(0x7f00000000c0)={0x67446698, 0x0, 0x4, 0x3, 0x2, "d533d9976eaff529b5da8be383ca814162262256f861ade0eafc8328db80564e295b17654f9026e9c643b43100a6f70042775ce85025ee277f8bc4bd3f8958fab6531f2248014d853f2305294b59da1515eeb6fa8868df0841e25a188438c30d269b6419cb3823921dc2106184cd74aa9b605f863c6eda235bbdcd14cbcc372ae0d3a307bb625fa110ae21c0a2857bd72259b9143f66184caacd28379ab9cf6b575f80c986a7dd94f47ab29e610db72af406f518c4b3f7231d3cc8324db8837ae84d2e2eed21c23232"}, 0xd9) semctl$IPC_RMID(r0, 0x0, 0x0) 15:50:45 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:45 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) ioctl$sock_ifreq(r0, 0x8991, &(0x7f0000000080)={'yam0\x00', @ifru_addrs=@llc={0x1a, 0x0, 0x7, 0x8, 0x20, 0x400, @dev={[], 0x2b}}}) 15:50:45 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0x4, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:45 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2202, 0x0) getsockname$unix(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) 15:50:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008915, &(0x7f0000000100)="11dc820010f36c5ed5c370") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x8010, r0, 0x3d) semop(0x0, &(0x7f0000000100), 0x2d) r1 = semget(0x0, 0x3, 0x0) semctl$IPC_RMID(r1, 0x0, 0x10) 15:50:45 executing program 5: semget(0x2, 0x7, 0x60) r0 = semget(0x2, 0x1, 0x41) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000000c0)=[0x45, 0x1d, 0xaf3, 0x80000001, 0x30, 0x8]) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$revoke(0x3, r1) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xffffffff, 0x80) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f00000001c0)={0x6640bc0b, 0x7fff, 0x5, 'queue0\x00', 0x80}) 15:50:45 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}, 0x7fff}, 0x38f) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:45 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00') mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x18) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x800, 0x0) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x2) symlink(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00') r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0xe7, 0x100) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 15:50:45 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)=[0x69a3]) semop(0x0, &(0x7f0000000040), 0x65) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:45 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) getresuid(&(0x7f0000000380)=0x0, &(0x7f00000003c0), &(0x7f0000000400)) stat(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000340)='./file0/file0\x00', r1, r2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r3 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r3, 0x7fffc) 15:50:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r1 = semget$private(0x0, 0x2, 0x20) semop(r1, &(0x7f0000000000)=[{0x3, 0x6, 0x1800}, {0x0, 0x9, 0x1000}], 0x129) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:46 executing program 5: syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x5be2, 0x80480) semget(0x0, 0x0, 0x8) r0 = semget(0x2, 0x7, 0x20) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000080)) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x305201, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f00000000c0)={0xc0000000, 0xd, "de9f76d37645c7b500d4bdb0ec7c719d18ee790ec7a917a78dfc5f6bf10ebf83", 0xc76, 0x9, 0x4, 0x5, 0x6000, 0xcc62, 0x80, 0x189, [0x8, 0x7e00000, 0x3, 0x5]}) 15:50:46 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x493ff6, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfff) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x11, &(0x7f0000000100), &(0x7f00000000c0)=0xffffffee) 15:50:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = accept4(r0, &(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000001c0)=0x2bb, 0x800) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000180)={{0x9, 0x101, 0x7, 0x3ff, 0x6, 0x100000001}, 0x4}) ioctl(r1, 0x6, &(0x7f0000000280)="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") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) pread64(r0, &(0x7f0000000000)=""/9, 0x9, 0xc1) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:46 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0x5, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:46 executing program 4: syz_read_part_table(0xee, 0xfffffea0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:50:46 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)={0x3, [0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000100)={r1, 0x40}, 0x8) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:46 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) dup(r0) r1 = gettid() fcntl$setown(r0, 0x8, r1) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r2, 0x7fffc) 15:50:46 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x20440, 0x0) write$P9_RMKNOD(r0, &(0x7f0000000040)={0x14, 0x13, 0x1, {0x20, 0x1, 0x2}}, 0x14) syz_read_part_table(0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000180)=0x2, 0x4) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f0000000100)={{r1, r2+30000000}, {r3, r4+30000000}}, &(0x7f0000000140)) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000240)={0x0, 0x9}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000002c0)={0x10001, 0x2, 0x8200, 0x4, 0x9bca, 0x0, 0x40, 0x6, r5}, &(0x7f0000000300)=0x20) ppoll(&(0x7f0000000340)=[{r0, 0xc}], 0x1, &(0x7f0000000380)={0x77359400}, &(0x7f00000003c0)={0x7}, 0x8) 15:50:46 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x3, &(0x7f0000000000)="86d13e7d880270a18013c3b51d3bfdf47a372ad2c493d3a66f5f0efe448f13d443b1537d36be123e83296a") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0xed) semctl$IPC_RMID(0x0, 0x0, 0x10) r2 = socket(0x5, 0x0, 0x8000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x102}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x74, r3, 0x20, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10000000000000}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x445}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bridge\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffff7f}]}, 0x74}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) 15:50:46 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)) semop(0x0, &(0x7f0000000100), 0x2d) r0 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000200)=0x60) pread64(r0, &(0x7f0000000240)=""/160, 0xa0, 0x0) semget(0x0, 0x0, 0x81) r1 = semget(0x2, 0x0, 0x42) semctl$IPC_RMID(r1, 0x0, 0x10) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@empty, @in=@multicast1}}, {{@in6}, 0x0, @in=@initdev}}, &(0x7f0000000140)=0xe8) 15:50:46 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x6, @local, 0x4}, 0xffffffef) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0xffffffffffffff17) 15:50:46 executing program 5: r0 = getpgid(0x0) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x80000001, 0x101000) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup3(r1, 0xffffffffffffff9c, 0x80000) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000000040)={0x6, 0x9}) ptrace$poke(0x5, r0, &(0x7f0000000140), 0x3) semget$private(0x0, 0x4, 0x40) r3 = semget$private(0x0, 0x1, 0x120) semctl$SETALL(r3, 0x0, 0x11, &(0x7f0000000000)) r4 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x1ff, 0x1c000) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) semop(0x0, &(0x7f0000000100), 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) ioctl$FS_IOC_SETVERSION(r4, 0x40087602, &(0x7f0000000100)=0x8) 15:50:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x1fc]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:46 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r0, 0x80000) 15:50:46 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='./file0\x00') rt_sigaction(0x11, &(0x7f0000000100)={&(0x7f0000000080)="410f601ac4e22bf50501f70000c441d4c6b23d00000005c462198e20e700423401c48238f38b00000080420fa1c44223f598500300006764f2470f5ea526000000", {0x1ea}, 0x40000000, &(0x7f0000000000)="0f380712c4e202f560ff450fcd450f01d7c4c2390c5c5d00c4c35169e59ac4437d05ab710000003a7e27c4a269b7362666420fd80f"}, 0x0, 0x8, &(0x7f0000000140)) 15:50:47 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:47 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x20000, 0x0, @local, 0x1}, 0xfffffd59) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000002600)={'veth0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000002640)={@mcast2, 0x13, r1}) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) r2 = open(&(0x7f0000000040)='./file0\x00', 0x8000, 0x44) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) 15:50:47 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x6fa, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) 15:50:47 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0xfffffffffffffff8, 0x101400) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180), &(0x7f00000001c0)=0xb) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x2200) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000000c0)={0x50000, 0x0, [0x8, 0x0, 0x3, 0x1, 0x203, 0x95, 0x8000, 0x2]}) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:47 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000000), 0x0) semget$private(0x0, 0x0, 0x60) semget$private(0x0, 0x2, 0x0) semget$private(0x0, 0x4, 0x40) semget(0x2, 0x1, 0x7) semget$private(0x0, 0x3, 0x61a) r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x200040) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000140)={0x4, 0x40, 0x6, 0x5}, 0x10) semget(0x1, 0x3, 0x4) semget(0x1, 0x0, 0x1) semget$private(0x0, 0x3, 0x0) semget(0x3, 0x3, 0x2) semget$private(0x0, 0x3, 0x41) semget(0x1, 0x2, 0x2) semget(0x1, 0x0, 0x2a0) semget(0x0, 0x2, 0x80) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x240200, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v1={0x1000000, [{0xffff, 0x2}]}, 0xc, 0x1) semget(0x3, 0x5, 0x8) semget(0x0, 0x1, 0x10d) r2 = semget(0x2, 0x2, 0x6) semctl$IPC_RMID(r2, 0x0, 0x10) 15:50:47 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000340)={0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000004}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x34, r3, 0x200, 0x70bd2a, 0x25dfdbff, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x8, 0x101, @l2={'ib', 0x3a, 'nlmon0\x00'}}}}, ["", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x4048004}, 0x20040080) dup3(r0, r1, 0x7fffc) 15:50:47 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_S_OUTPUT(r1, 0xc004562f, &(0x7f0000000080)=0xffffffffffff8000) 15:50:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe2$9p(&(0x7f0000000000), 0x80000) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) r1 = semget$private(0x0, 0x7, 0x100) semctl$IPC_RMID(r1, 0x0, 0x10) 15:50:47 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='./file0\x00') 15:50:47 executing program 5: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) epoll_pwait(r0, &(0x7f0000000040)=[{}, {}, {}, {}, {}], 0x5, 0x5, &(0x7f00000000c0)={0x5}, 0x8) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0xc0, 0x7, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffff2b, 0x100000000, 0x7, 0x3, 0x4, 0x400, 0x2, 0x2, 0x0, 0x1e, 0x3ff, 0x7, 0xba0, 0x81, 0x5, 0x100000001, 0x101, 0x1, 0x2, 0x7e1, 0x4, 0x1, 0x8, 0x100000000, 0x5c, 0x9d9, 0x4, 0x5, 0x0, 0x1, 0x1, @perf_config_ext={0x0, 0x10}, 0x100, 0x3, 0x20, 0x0, 0x5, 0x2, 0x1f}, r2, 0x10, r0, 0x1) 15:50:47 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}, 0xfffffffffffffffe}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x2, 0x480080) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0x2d5) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) close(r1) write$FUSE_ATTR(r1, &(0x7f00000002c0)={0x78, 0x0, 0x5, {0x101, 0xffffffff80000000, 0x0, {0x3, 0xba9e, 0xc6c, 0x3f, 0x200, 0x1, 0x9, 0x4bd9ddd, 0x8, 0x1ff, 0x800, r2, r3, 0x4, 0x10001}}}, 0x78) 15:50:47 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semget$private(0x0, 0xfffffffffffffffd, 0x106) r0 = semget$private(0x0, 0x4, 0x220) syz_open_dev$sndtimer(&(0x7f0000000840)='/dev/snd/timer\x00', 0x0, 0x80) semop(r0, &(0x7f0000000140)=[{0x3, 0x3b37ae03, 0x800}, {0x1, 0x0, 0x1000}], 0x1ae) semctl$IPC_RMID(0x0, 0x0, 0x10) r1 = semget$private(0x0, 0x7, 0x300) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) semtimedop(r1, &(0x7f0000000000)=[{0x4, 0x4}, {0x3, 0x1f, 0x800}, {0x0, 0x6, 0x1000}, {0x7, 0x3f, 0x1800}, {0x3, 0x25b9cd61, 0x1800}], 0x5, &(0x7f00000000c0)={r2, r3+10000000}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000200)=""/222, 0xde}, {&(0x7f0000000300)=""/92, 0x5c}, {&(0x7f0000000380)=""/88, 0x58}, {&(0x7f0000000400)=""/153, 0x99}, {&(0x7f00000004c0)=""/147, 0x93}, {&(0x7f0000000580)=""/195, 0xc3}, {&(0x7f0000000680)=""/184, 0xb8}], 0x7, &(0x7f0000000100)=""/15, 0xf}, 0x100) bind$bt_l2cap(r4, &(0x7f0000000800)={0x1f, 0x10001, {0x0, 0x3, 0x2, 0x401, 0xdf3f, 0x8}, 0x5, 0x4}, 0xe) 15:50:47 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0x7, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:47 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x8080, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:50:47 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dsp\x00', 0x100, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:47 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r0 = semget$private(0x0, 0x2, 0x100) prctl$PR_SET_THP_DISABLE(0x29, 0x1) semget$private(0x0, 0x4, 0x4) r1 = semget(0x0, 0x3, 0x22) semop(r1, &(0x7f0000000100), 0x0) r2 = semget$private(0x0, 0x1, 0x7fffffffc) semctl$IPC_STAT(r0, 0x0, 0x2, 0xfffffffffffffffe) semctl$IPC_RMID(0x0, 0x0, 0x10) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f00000000c0)=""/4096) 15:50:47 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000040)={0x9, 0x4, 0x40}, 0xc) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x40, 0x0) write$P9_RATTACH(r1, &(0x7f0000000100)={0x14, 0x69, 0x2, {0x80, 0x4, 0x7}}, 0x14) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:48 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0x9) r1 = semget$private(0x0, 0x3, 0x4) connect$netlink(r0, &(0x7f0000000100)=@unspec, 0xc) semop(r1, &(0x7f00000000c0), 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) epoll_create(0xc0) semctl$GETVAL(r1, 0x5, 0xc, &(0x7f00000000c0)=""/50) 15:50:48 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) ptrace$setsig(0x4203, r0, 0x8, &(0x7f0000000040)={0x40, 0x9, 0x2}) syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:50:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r1 = socket$caif_stream(0x25, 0x1, 0x1) syncfs(r1) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:48 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000003c0)={0x1, &(0x7f0000000380)=[{0x40, 0x76c8, 0x200, 0x6}]}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:48 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0x8, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:48 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/vga_arbiter\x00', 0x100, 0x0) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x8) semop(0x0, &(0x7f0000000100), 0x2d) r1 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x80800) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000001700)=""/87) recvmsg(r1, &(0x7f0000001680)={&(0x7f00000000c0)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000001580)=[{&(0x7f0000000140)=""/146, 0x92}, {&(0x7f0000000200)=""/148, 0x94}, {&(0x7f00000002c0)=""/80, 0x50}, {&(0x7f0000000340)=""/109, 0x6d}, {&(0x7f00000003c0)=""/175, 0xaf}, {&(0x7f0000000480)=""/255, 0xff}, {&(0x7f0000000580)=""/4096, 0x1000}], 0x7, &(0x7f0000001600)=""/104, 0x68}, 0x20) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:48 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x800, 0x0) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:48 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000001240)='/dev/dsp\x00', 0x513000, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) syz_mount_image$nfs(&(0x7f0000000000)='nfs\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x2, &(0x7f0000000140)=[{&(0x7f0000000240)="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", 0x1000, 0xb9}, {&(0x7f0000000080)="96af4581c91c900912776ccecc528ea9280e2719acb65f605e529cb6aa0fa587dca05369fe033ee69126325f59e4da83383fcb3214219e71a84aa1a98add02958b61567ef837869044888b4102bb2c198dbb9d8dc6ad282a112611d1e286737cfbd3709a73572f29f436f583a39c0bd26b96352cb49c6e9c0ad3c57f26dac209b391cb", 0x83, 0x8}], 0x180000, &(0x7f0000000180)='vboxnet1ppp0\x00') r1 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl$UI_SET_KEYBIT(r1, 0x40045565, 0x54) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:50:48 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:48 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) r2 = dup3(r0, r1, 0x7fffc) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000340)={'icmp6\x00'}, &(0x7f0000000380)=0x1e) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f00000003c0)=""/26) 15:50:48 executing program 5: r0 = semget(0x2, 0x3, 0x400) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)=[0x2000000000]) semop(0x0, &(0x7f0000000100), 0x2d) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x7}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000180)={r2, 0x800}, &(0x7f00000001c0)=0x8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000080)={0x0, 0x70, 0x9, 0x4fb, 0x0, 0x8, 0x0, 0x3, 0xc000, 0x5, 0x0, 0x3581, 0x6, 0x200, 0x1, 0x8001, 0x4, 0x71cc, 0x5, 0x1, 0x1, 0x4, 0x1, 0x8000000, 0xfffffffffffffff8, 0x80, 0x6, 0x7, 0x101, 0x3, 0x20, 0x0, 0xdbb2, 0x7ff, 0x7ff, 0x80000001, 0x289c6a25, 0x3d, 0x0, 0x4, 0x4, @perf_config_ext={0x8001, 0x1}, 0x400, 0x90c, 0x1000, 0x2, 0x7ff, 0x5, 0x7}) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:48 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x3, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000180)={0x0, 0x0, 0x80000001}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffff9c, 0xc010640b, &(0x7f00000001c0)={0x0, 0x0, 0x800}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000200)={r1, r2}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0xc000, 0x0) write$FUSE_WRITE(r4, &(0x7f0000000100)={0x18, 0xffffffffffffffda, 0x4, {0x8}}, 0x18) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r4, 0x6, 0x15, &(0x7f00000000c0)=0x3, 0x4) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:48 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3f, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x3, 0x2) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x9, 0x9, 0x5, 0x7, 0x3}, &(0x7f0000000180)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e24, @local}}, 0x3, 0x48}, 0x90) 15:50:48 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x2d90}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x1, 0x5b, 0x0, 0xfb1, 0x3, 0x4, 0x1, 0x3, r1}, &(0x7f0000000180)=0x20) syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f0000000140)='\x00', &(0x7f0000000100)='./file0\x00') 15:50:48 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x100040, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000008}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r1, 0x300, 0x70bd26, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x3}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x0) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) r2 = semget(0x1, 0x4, 0x10c) semctl$SETVAL(r2, 0x1, 0x10, &(0x7f0000000000)=0x1b6) 15:50:48 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0x9, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)="c611ed26440b435ef4cb41e24d61c3792e05304c487bbc7b76d08ea47c346770e268209294cb540c6eb2c47db7959c05c288f5f62e57e31c96d5bc1e4f9bb52d5c9c4b0b392eebe8a9d42c243df4c251e3e047095224c57b3c446d8c9970a44e4b9199db82fab8c7ad01457b1473b0595d0081897943f6e505e3d2544672aacad4095d8fff", 0x85}], 0x1, 0x9) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:48 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in6=@mcast2}}, &(0x7f0000000500)=0xe8) mount$bpf(0x0, &(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000380)='bpf\x00', 0x202000, &(0x7f0000000600)={[{@mode={'mode', 0x3d, 0xad}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x9ac}}, {@mode={'mode', 0x3d, 0xfffffffffffffffe}}, {@mode={'mode', 0x3d, 0x5c3a}}, {@mode={'mode', 0x3d, 0xe5}}, {@mode={'mode', 0x3d, 0x80000000}}, {@mode={'mode', 0x3d, 0x10000}}, {@mode={'mode', 0x3d, 0x100000001}}], [{@uid_lt={'uid<', r0}}, {@subj_user={'subj_user', 0x3d, 'trusted.overlay.nlink\x00'}}]}) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) r2 = syz_open_dev$vcsn(&(0x7f0000000540)='/dev/vcs#\x00', 0x51c, 0x240100) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000740)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xa}}}, 0x200000, 0x7fffffff, 0x113f, 0x4, 0xc2}, &(0x7f0000000580)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000840)={r3, 0x9, 0x20}, &(0x7f0000000880)=0xc) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r1, r4, 0x7fffc) 15:50:49 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x3) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x424000, 0x0) getsockopt$inet6_int(r1, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:49 executing program 5: r0 = semget(0x1, 0x3, 0x400) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x101080, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x404, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x404c004) 15:50:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x100) 15:50:49 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)=[0x200]) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x2000, 0x0) name_to_handle_at(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x56, 0x3, "0c8f312dcc78361f46b4711d93c8074c8ffb2b935729b84740efe552bb008bd379ad57f205bac898ed7c2a598f6f46b3f22b1ca6cf8d18dbd3fadbae4b0bd98515bd2aed8e9f7cd65c72b7da1c19"}, &(0x7f0000000140), 0x400) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:49 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x49b6, 0x80) ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, &(0x7f0000000080)={0x0, 0x8}) r1 = socket$inet6(0xa, 0x7, 0x3) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) 15:50:49 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000140), 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='wchan\x00') getsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x4) socket(0x1, 0x4, 0x8) 15:50:49 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000480)="8e8fa6b889701ecd395eaeb52ec80e16f53f43e4c9dc3d60d2fae3b283fb21a2082e9506a351a0d2368cc613dd75f9553a92cf93bdd156d1bf3b27fe42a555", 0x3f) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) r2 = syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x6, 0x400) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r2, 0xc0405519, &(0x7f0000000380)={0x3, 0x5, 0x9ca, 0x8000}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) ioctl$SIOCX25GCALLUSERDATA(r2, 0x89e4, &(0x7f00000003c0)={0x1d, "b7e35004c4ff190eb7cce13d06ee1fc143f1700e489e9a212cb6e0fa291a82a88044b8438c383bf6033e3661c30972e6a073f82c22fa294907ae9190d1696e9c065e62b38bcb5d1efbf9e593e7adee953211770b741af3bb18bf5d3958b780bf039f4baeb6a42f2dc617bb1774351546385117b637b97613b172eefc56e9e703"}) 15:50:49 executing program 5: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)=0x0) getpgrp(r0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r1 = semget$private(0x0, 0x0, 0x88) r2 = socket$rxrpc(0x21, 0x2, 0xa) sendmsg$inet(r2, &(0x7f0000000340)={&(0x7f0000000100)={0x2, 0x4e20, @loopback}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000140)="f1b99e526646ed9af92b17bf68509d3753d2dfcdd34a2db4a8404855f90380f3bceccf1703d949b7e80fbc3909bf2db23b66f098fe1dc0ec04f8fcf56eb33a057b19a56ece7d9a1a0dd84a471687820fcfaaa1c37cc8537e0ec727b7269cc62127113e32d989f3c9547203aaea5da18b07972eae583422ca5c", 0x79}, {&(0x7f00000001c0)="9db8be160a348c9b7b54ece7f02679b707a8941bb44671775fb192522911ac080083fe78dffe8dd2ecf7a75fccbb117d373ba5bb844b79f8582b39504a13d5600a5eab8fef05eb761674c434e1d5f0c297fb0d07a4f662d38d6595ef6356808bc2747e0cfd6e71146b6da376d1c2c1606ef7d1ca638e8b3a471b892e7f0613cdfaed4361a5c9d8f93781b753e5687a37124376de751d4df67b1e8d2e89df7ed3c0f32316e5aac4e5879be31b30d399d8c440b6721f", 0xb5}], 0x2, &(0x7f00000002c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x400000000000000}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x20}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}], 0x48}, 0x7b3151d2fca69c4a) creat(&(0x7f0000000400)='./file0\x00', 0x124) semctl$SEM_STAT(r1, 0x100000000000000, 0x12, &(0x7f0000000000)) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x1a, 0x800}, {0x3, 0x8, 0x800}, {0x7, 0x4}, {0x3, 0xffffffff80000000, 0x1000}, {0x0, 0x4, 0x1800}, {0x0, 0x4, 0x1000}, {0x4, 0x8, 0x1000}, {0x3, 0x0, 0x1800}, {0x1, 0x4, 0x1800}], 0x9) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', 0x400, 0x0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r3, 0xc0305616, &(0x7f0000000000)={0x0, {0x8000, 0xe0}}) ioctl$SIOCGSTAMP(r3, 0x8906, &(0x7f0000000040)) semctl$IPC_RMID(0x0, 0x0, 0x10) r4 = getpgid(0xffffffffffffffff) getpriority(0x1, r4) 15:50:49 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xb, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0x3, "ac0377"}, &(0x7f00000000c0)=0xb) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100)={r2, 0x8, 0xfffffffffffffff9}, 0x8) 15:50:49 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) accept$unix(r0, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:49 executing program 4: syz_read_part_table(0x200000000007, 0x2cb, 0x0) mount$9p_virtio(&(0x7f0000000000)='/dev/dmmidi#\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x800, &(0x7f0000000180)={'trans=virtio,', {[{@access_any='access=any'}, {@cache_mmap='cache=mmap'}, {@fscache='fscache'}, {@mmap='mmap'}, {@version_9p2000='version=9p2000'}], [{@smackfsdef={'smackfsdef'}}]}}) r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xfffffffffffffffe, 0x501000) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') [ 1752.598988][T12970] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:49 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x800, 0x1, 0x80000001, 0x2, 0x3d40}, &(0x7f0000000100)=0x14) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000140)={r2, 0x68}, 0x8) 15:50:49 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) r0 = semget(0x2, 0x1, 0x8) semop(r0, &(0x7f0000000000)=[{0x3, 0xff, 0x800}, {0x0, 0x1, 0x1000}, {0x3, 0x1000, 0x800}, {0x0, 0x40, 0x1800}], 0x4) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x10000, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000140), &(0x7f0000000100)=0x30a) ioctl(r0, 0x3, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:49 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) write$P9_RLCREATE(r2, &(0x7f0000000340)={0x18, 0xf, 0x1, {{0x74, 0x4, 0x4}, 0x1}}, 0x18) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:49 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x8000, 0x0) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={0x0}, &(0x7f0000001380)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000013c0)={r1, 0x5}, 0x8) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000001340)={0x200, 0x1, 0x7947}) getsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000001280)=""/129, &(0x7f00000001c0)=0x81) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x8, 0x3, 0x1, 0x80, 0x1, 0x40, [], 0x0, 0xffffffffffffffff, 0x1}, 0x3c) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000240)=ANY=[@ANYBLOB="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"]) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0/file0\x00', 0x0, 0x18}, 0x10) 15:50:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") prctl$PR_SET_PDEATHSIG(0x1, 0x24) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:50 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f00000000c0), 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:50 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'rose0\x00', {0x2, 0x4e23, @rand_addr=0xffff}}) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:50 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0x25, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:50 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:50:50 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/mixer\x00', 0x101900, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000000380)=""/85) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f0000000400)=""/135, &(0x7f0000000500)=0x87) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r1, r2, 0x7fffc) 15:50:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x20000, 0x0) ioctl$KDGKBTYPE(r2, 0x4b33, &(0x7f0000000140)) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000000c0)={0x10000, 0x0, [0x8, 0x3, 0x6, 0x9, 0x40, 0x0, 0x1, 0x4]}) semget(0x3, 0x1, 0x100) r3 = semget$private(0x0, 0x0, 0x410) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000001c0), &(0x7f0000000200)=0x4) semop(r3, &(0x7f0000000180)=[{0x0, 0xffffffffffffff01, 0x800}, {0x0, 0x3, 0x1000}, {0x4, 0x7, 0x800}, {0x1, 0x2, 0x1800}, {0x1, 0x9, 0x1800}, {0x4, 0xc9c, 0x1800}, {0x7, 0x7fff, 0x1800}], 0x7) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:50 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)) semop(0x0, &(0x7f0000000100), 0x2d) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 1753.318671][T13379] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:50 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x800, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000100)={0x5, {{0xa, 0x4e21, 0x7, @loopback, 0x7}}, 0x0, 0x7, [{{0xa, 0x4e22, 0x7ff, @dev={0xfe, 0x80, [], 0x22}, 0x6}}, {{0xa, 0x4e21, 0x6, @ipv4={[], [], @multicast2}, 0x3064}}, {{0xa, 0x4e20, 0x1ff, @local, 0x6}}, {{0xa, 0x4e22, 0x7, @loopback, 0xfffffffeffffffff}}, {{0xa, 0x4e23, 0xabfc, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3f}}, {{0xa, 0x4e20, 0x4, @mcast1, 0x4}}, {{0xa, 0x4e23, 0x3, @local, 0x3}}]}, 0x410) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f0000000040)={0x6, 0x3, 0x7c827835}) 15:50:50 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth0_to_bridge\x00', 0x0}) r2 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x0, 0x2) setsockopt$inet6_dccp_buf(r2, 0x21, 0x82, &(0x7f00000001c0)="ceba462bdae7c81e578eb461890a19ede69c697d1830c7479a5c44740632b9f64295171eef07dfc64b366cce96ac0189244b6ff803781ac179cfccee23d1115cdd66ba3a51a3ac0ce2bf44013345b7ffd4ac84221625fc1b541ce52a04ef1c1f8b55fecbde8f2ed2009f0a1bad4dfae166b19f633b06f786bf91855599e3dcab18a58f", 0x83) recvfrom(r0, &(0x7f0000000040)=""/3, 0x3, 0x40000001, &(0x7f0000000100)=@ll={0x11, 0x1c, r1, 0x1, 0x1000, 0x6, @random="239b6b5d6245"}, 0x80) getsockopt$inet6_int(r2, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f0000000280)=0x4) 15:50:50 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='./file0\x00') r0 = semget(0x2, 0x1, 0x10a) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) getgroups(0x6, &(0x7f0000000080)=[0x0, 0xee01, 0x0, 0xffffffffffffffff, 0xee00, 0x0]) r3 = geteuid() getrlimit(0x4, &(0x7f0000000180)) r4 = getegid() semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f00000000c0)={{0x7ff, r1, r2, r3, r4, 0x12c, 0x4}, 0x2, 0x1f, 0x3}) r5 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000140)={0x28, 0x0, 0x2710, @my=0x1}, 0x10, 0x800) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r5, 0x111, 0x5, 0x20, 0x4) listen(r5, 0xc8) 15:50:50 executing program 3: r0 = semget$private(0x0, 0x0, 0x2) semop(r0, &(0x7f0000000000)=[{0x3, 0x4c3c64eb, 0x1000}, {0x3, 0x6, 0x800}, {0x3, 0x9, 0x1800}, {0x1, 0x5, 0x800}, {0x7, 0xfd, 0x800}, {0x0, 0x6b, 0x1800}], 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:50 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x20000) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000040)={0x758, 0x9bf0}) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:50 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x22000, 0x0) connect$unix(r2, &(0x7f0000000600)=@file={0x0, './file0/file0\x00'}, 0x6e) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='bpf\x00', 0x4000, &(0x7f0000000500)={[{@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x254}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x4}}], [{@dont_appraise='dont_appraise'}, {@subj_role={'subj_role', 0x3d, '-eth0/:..eth1\xc9)owlan1('}}, {@euid_eq={'euid', 0x3d, r3}}]}) dup3(r0, r1, 0x7fffc) 15:50:50 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$IMGETCOUNT(r1, 0x80044943, &(0x7f0000000080)) 15:50:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x2400, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) bind$packet(r1, &(0x7f0000000200)={0x11, 0x17, r2, 0x1, 0xfff}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:51 executing program 4: syz_read_part_table(0x0, 0xffffffffffffffdf, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000140)={0x2, 0x0, @local}, &(0x7f0000000180)=0x10, 0x800) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x9, 0x30}, &(0x7f0000000280)=0xc) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000002c0)={r1, @in={{0x2, 0x4e22, @multicast1}}}, 0x84) r2 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x2, 0x200) ioctl$SIOCRSACCEPT(r2, 0x89e3) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$update(0x2, r3, &(0x7f0000000400)="6c2d4a02d12d1617b2c9ac314945c781e00f32f5a88abca0be6d8af2e3f374b66bc2a4e7d87a6a0efcf398747347f280af053ae1b9e1c032aa3a2adc5252c7b5c7ae60dcfe577e44dede31ac97903df8841569870d738f0f77f0c47726869f92795d2480e4e955b96edd8ed31ee4e3ca3b8a3147a25b46d578f287bf0f59b475d94ff435a32de0adc362ba9b7ddf852b7884345ccdb5ce6f27a9e7f62ae557d7a0ab755ae5b36d75b277c412764db42d30d1b3c27395cedd3a9116fcca0ab2aa9adb1df2568d", 0xc6) ioctl(r2, 0x401, &(0x7f0000000100)="473b244b540338554d5f0117c823a512e05654236ef5937fbd1b72a3890a9b") ioctl$sock_netrom_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000040)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x100000000, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x8, 0x3, [@default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) 15:50:51 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0x68, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:51 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)) r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xcc) connect$ax25(r0, &(0x7f0000000500)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2}, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x3, 0x40000) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000580)=""/4096) semget$private(0x0, 0x4, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) sendmsg$can_raw(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x1d, r2}, 0x10, &(0x7f0000000300)={&(0x7f0000000280)=@canfd={{0x1, 0x4, 0xba0, 0x7}, 0x1a, 0x3, 0x0, 0x0, "3b6da7485344cb5509c2ff85fc0da6125b7ad5d42c4cab98714dcc39f5d37c2817a67137bd45d06d9f9a1e2d1062cebe7ccddd25ab93ff7a6f8851d78f66dc1d"}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x0) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:51 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x40000000, @ipv4={[], [], @local}, 0x4000000000000}, 0xffffffffffffff4b) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:51 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000000800000087000000000000009500000000000100"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) prctl$PR_SET_TIMERSLACK(0x1d, 0x7) semop(0x0, &(0x7f0000000100), 0x2d) semget(0x1, 0x3, 0x140) semget$private(0x0, 0x1, 0x20) semget(0x2, 0x3, 0x203) semget$private(0x0, 0x5, 0x9) semget(0x2, 0x3, 0x0) semget(0x2, 0x7, 0x0) semget(0x3, 0x1, 0x3f0) semget$private(0x0, 0x3, 0x20) r0 = semget$private(0x0, 0x0, 0x22) semctl$IPC_RMID(r0, 0x0, 0x10) 15:50:51 executing program 4: syz_read_part_table(0x100000000000000, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:50:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") close(r0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$VIDIOC_G_STD(0xffffffffffffff9c, 0x80085617, &(0x7f0000000000)=0x0) write(r1, &(0x7f00000001c0)="dfeb3737dd3d4285fe2b54541f5b88361258d010597a81d556dc8f1055712b1fa31738d38cc9db545d8a7645ccc57801afbeb66813e1f3f5c76f1b36d17dc59876975e75dd7ee07fc79ef6c092bfbc01c3976cf024d08c3aa604b66d2aad4f46774a5055bb7f4f7652442cc330c1ba405241603875aa35fa90bca3a2ee7feba412351b03cef5508cf2ca496d8e29b048af2b764a3d24fa81a716a6893201209cc409fe7c7d2b60ffd175efa1abbab1c902f039a1319c1972e958710052", 0xbd) delete_module(&(0x7f0000000100)='em0*eth1]keyringcpusetsystemself\x00', 0x200) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f00000000c0)=r2) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) ioctl$VIDIOC_QUERYCTRL(r1, 0xc0445624, &(0x7f0000000140)={0x2a0, 0x102, "25a6b13bb4c81ea3b92a8d767e247beafc96609dfe4d5780e6ca54bc40f1b7af", 0x2, 0x2, 0x1, 0x2, 0xf7db0bd464854987}) 15:50:51 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0xfffffffffffffffd, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000440)=0xe8) lstat(&(0x7f0000000480)='./file1\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000000)='./file0/file0\x00', r1, r2) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) r3 = dup3(r0, r0, 0x80000) getsockopt$nfc_llcp(r3, 0x118, 0x3, &(0x7f0000000340)=""/144, 0x90) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r4, 0x7fffc) [ 1754.174184][T13782] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:51 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x3, 0x40) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000100)={'filter\x00', 0xbf, "982ba51afbed074ceb6a67ac82a57b379de259a169118fc296d57722f6c4c8c889551906e3be0181706ec6105efb31a4339ada1b9dad276fd830859e473b4d48ffc71d7f2459d2cd8a00f36fd2b7ea3f319239340b3aa02c45a66ecae30d7f4fa43f386f6ef9da416568f9fd6296f2c9a710ded696c59db54a805cd2466caec670d6b451b8c19d186ca84af0bb85a0fa060638fe81e90b3fe81e577f6ceaf41573436b0882a88ab0fa4e6efc4cdbefe72225bbd91595e198272c22f04ae23b"}, &(0x7f0000000080)=0xe3) recvmmsg(r0, &(0x7f000000ae00)=[{{&(0x7f0000000640)=@nl=@unspec, 0x80, &(0x7f0000001940)=[{&(0x7f00000006c0)=""/26, 0x1a}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/227, 0xe3}, {&(0x7f0000001800)=""/81, 0x51}, {&(0x7f0000001880)=""/173, 0xad}], 0x5, &(0x7f00000019c0)=""/91, 0x5b}, 0x100000001}, {{0x0, 0x0, &(0x7f0000002f40)=[{&(0x7f0000001a40)=""/125, 0x7d}, {&(0x7f0000001ac0)=""/14, 0xe}, {&(0x7f0000001b00)=""/1, 0x1}, {&(0x7f0000001b40)=""/58, 0x3a}, {&(0x7f0000001b80)=""/98, 0x62}, {&(0x7f0000001c00)=""/242, 0xf2}, {&(0x7f0000001d00)=""/154, 0x9a}, {&(0x7f0000001dc0)=""/243, 0xf3}, {&(0x7f0000001ec0)=""/124, 0x7c}, {&(0x7f0000001f40)=""/4096, 0x1000}], 0xa, &(0x7f0000003000)=""/144, 0x90}, 0x320}, {{&(0x7f00000030c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000005340)=[{&(0x7f0000003140)=""/24, 0x18}, {&(0x7f0000003180)=""/98, 0x62}, {&(0x7f0000003200)=""/58, 0x3a}, {&(0x7f0000003240)=""/44, 0x2c}, {&(0x7f0000003280)=""/85, 0x55}, {&(0x7f0000003300)=""/4096, 0x1000}, {&(0x7f0000004300)=""/4096, 0x1000}, {&(0x7f0000005300)=""/52, 0x34}], 0x8, &(0x7f00000053c0)=""/248, 0xf8}, 0x10001}, {{&(0x7f00000054c0)=@ax25={{0x3, @null}, [@remote, @null, @remote, @null, @netrom, @rose, @netrom, @null]}, 0x80, &(0x7f0000005700)=[{&(0x7f0000005540)=""/27, 0x1b}, {&(0x7f0000005580)=""/141, 0x8d}, {&(0x7f0000005640)=""/15, 0xf}, {&(0x7f0000005680)=""/121, 0x79}], 0x4, &(0x7f0000005740)=""/85, 0x55}, 0xffffffff00000000}, {{&(0x7f00000057c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000006bc0)=[{&(0x7f0000005840)=""/31, 0x1f}, {&(0x7f0000005880)=""/201, 0xc9}, {&(0x7f0000005980)=""/137, 0x89}, {&(0x7f0000005a40)=""/84, 0x54}, {&(0x7f0000005ac0)=""/240, 0xf0}, {&(0x7f0000005bc0)=""/4096, 0x1000}], 0x6, &(0x7f0000006c40)=""/51, 0x33}, 0x8}, {{&(0x7f0000006c80)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000006f40)=[{&(0x7f0000006d00)=""/169, 0xa9}, {&(0x7f0000006dc0)=""/91, 0x5b}, {&(0x7f0000006e40)=""/246, 0xf6}], 0x3}, 0x7}, {{&(0x7f0000006f80)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x80, &(0x7f0000007040)=[{&(0x7f0000007000)=""/22, 0x16}], 0x1, &(0x7f0000007080)=""/166, 0xa6}, 0x100000003}, {{&(0x7f0000007140)=@ax25={{0x3, @bcast}, [@remote, @rose, @netrom, @default, @remote, @default, @remote, @default]}, 0x80, &(0x7f0000009540)=[{&(0x7f00000071c0)=""/4096, 0x1000}, {&(0x7f00000081c0)=""/4096, 0x1000}, {&(0x7f00000091c0)=""/6, 0x6}, {&(0x7f0000009200)=""/1, 0x1}, {&(0x7f0000009240)=""/238, 0xee}, {&(0x7f0000009340)=""/100, 0x64}, {&(0x7f00000093c0)=""/223, 0xdf}, {&(0x7f00000094c0)=""/119, 0x77}], 0x8, &(0x7f00000095c0)=""/20, 0x14}, 0x3e6}, {{&(0x7f0000009600)=@generic, 0x80, &(0x7f0000009740)=[{&(0x7f0000009680)=""/132, 0x84}], 0x1, &(0x7f0000009780)=""/59, 0x3b}, 0xe3d}, {{&(0x7f00000097c0)=@can, 0x80, &(0x7f000000acc0)=[{&(0x7f0000009840)=""/246, 0xf6}, {&(0x7f0000009940)=""/211, 0xd3}, {&(0x7f0000009a40)=""/12, 0xc}, {&(0x7f0000009a80)=""/4096, 0x1000}, {&(0x7f000000aa80)=""/197, 0xc5}, {&(0x7f000000ab80)=""/144, 0x90}, {&(0x7f000000ac40)=""/19, 0x13}, {&(0x7f000000ac80)=""/36, 0x24}], 0x8, &(0x7f000000ad40)=""/140, 0x8c}, 0x1000}], 0xa, 0x0, &(0x7f0000000600)) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) write$smack_current(r1, &(0x7f0000000200)='/dev/snd/pcmC#D#p\x00', 0x12) 15:50:51 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x7fffffff, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000140)={0x1, 0x0, {0xfffffffffffff206, 0x4, 0x300e, 0x7, 0x3, 0x3, 0x0, 0x7}}) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1, 0x20000) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f0000000040)={0x2, 0x0, 0x6, 0x73d, 0x3, 0x8001}) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semget(0x2, 0x4, 0x200) semget$private(0x0, 0x1, 0x20) semget(0x3, 0x4, 0x11) semget(0x2, 0x0, 0x100) semget$private(0x0, 0x3, 0x410) semget$private(0x0, 0x3, 0x0) semget$private(0x0, 0x3, 0x3e53b6a37e114429) semget$private(0x0, 0x3, 0x2) r2 = semget(0x1, 0x3, 0x100) semctl$IPC_RMID(r2, 0x0, 0x10) syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x8, 0x0) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f00000001c0)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000200)=0x0) fcntl$lock(r1, 0x27, &(0x7f0000000240)={0x0, 0x2, 0xfd, 0x200000000000, r3}) 15:50:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000500)="11dca5055e0bcfec7be070") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f00000000c0)=0xc) fcntl$lock(r0, 0x24, &(0x7f0000000040)={0x4, 0x4, 0x7, 0x4, r1}) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x600}, 0xc, &(0x7f0000000480)={&(0x7f0000000600)=ANY=[@ANYBLOB="00000000a93cc3ab08c286d02f8a79c0efd2fd88fbea9a0bcb87f1b7bd9423598c3fc5f38d3dfce516a58097af4ecfb920f722d943d28656361b7bc190a2bdb4635c30fd500dab1a9f0414d9717bfc9c1644ced58e04216133e1fc0c89c3e9f3eab132d59621cc7d13494958e39b4aadc21c776d7dbea16d9b2175668b524368cdf1c45642dd69d66a58512b781acbc559c79e19c6cb03a3bb13b7e8a862572d7b32443c3f02d3c45386a4ebd0490225eba152e6e57fd0f8503ac8944350823df1ab8ef9ec8abd969cb89ed6767bc3049903db9a943173c9318ae36390943a8ab88d354a51bf8f6156dbf59d46450081bf448a87b859eca6b4c3c5526fa9569a91b6079781c5ef5c9aa21198192d58bccc12d01a14780801d59721f23e26c0efd78e892b6b45d3f51b5f5310ffe88a0b9a0bcc0c5204374dbfae25dd7e840b4ec86c152f67cb774e6841664602a1e0091de6ad3aa83ca5d8", @ANYRES16=r2, @ANYBLOB="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"], 0x1c0}, 0x1, 0x0, 0x0, 0x40011}, 0x80) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x40000, 0x0) fallocate(r3, 0x4, 0xe2, 0x5) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f00000001c0)={0x5, 0x70, 0xd7d, 0x5, 0x6, 0x3, 0x0, 0x9, 0xa0009, 0x4, 0x6, 0x80000000, 0x0, 0x10000, 0x80, 0x6b0e, 0x6d3c, 0x5, 0x9, 0x9, 0x9, 0x4, 0x80000001, 0x0, 0x0, 0x5, 0x8, 0x9, 0x9, 0x3, 0x10001, 0x401, 0x80, 0x3, 0x2, 0x3f, 0x7ff, 0xa439, 0x0, 0x80, 0x4, @perf_bp={&(0x7f0000000180), 0x1}, 0x8, 0x7ff, 0x7, 0x5, 0x3ff, 0x4, 0x3}) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:51 executing program 4: syz_read_part_table(0x0, 0x24d, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:50:51 executing program 5: r0 = semget(0x2, 0x2, 0x12) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000100)=[0x1000009, 0x3]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(r0, 0x0, 0x10) 15:50:51 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0x601, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:51 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x400400, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r2, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x1c}}, 0x80) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x2, 0x0) ioctl$RTC_UIE_ON(r3, 0x7003) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) 15:50:51 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x1, &(0x7f0000000380)={0x3, &(0x7f0000000340)=[{0x4, 0x3, 0x2f95f017, 0x3}, {0x898c, 0x80000001, 0x4, 0x8}, {0x5, 0x6, 0x5, 0x3}]}) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x505400, 0x0) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f0000000100)=0x7fc) semop(0x0, &(0x7f0000000100), 0x2d) 15:50:51 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:50:51 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x67, 0x100) connect$x25(r0, &(0x7f0000000040)={0x9, @remote={[], 0x0}}, 0x12) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:52 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0x6ef3, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:52 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000100), 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) 15:50:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x111800, 0x0) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000140)=""/23) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x260200) setsockopt$bt_hci_HCI_DATA_DIR(r2, 0x0, 0x1, &(0x7f00000000c0)=0x7, 0x4) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:52 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r0 = semget$private(0x0, 0x2, 0x30) semop(r0, &(0x7f0000000100), 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vcan0\x00', r2}) 15:50:52 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='./file0\x00') 15:50:52 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xc5e5e, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:52 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) fallocate(r0, 0x5, 0xd88, 0x9) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000400)='/dev/audio#\x00', 0x41, 0x20000) getsockopt$inet_tcp_int(r1, 0x6, 0x9, &(0x7f0000000440), &(0x7f0000000480)=0x4) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80540, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000600)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000580)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000840)=0xe8) mount$bpf(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='bpf\x00', 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="6d6f64653d303137373737dc92f9915dfc77343737373737373736372c7569643c0858456eb2a355c5a9a0f74fc656fd6da0754b8eac4cd0bca496dfe841e1c9c477df95368c5108887e8313122a6ed887864b164c8869a02a3154777112a9008c721de3d145b264544246d5a7e80e2cf0d08b6e89757c5bf9b36c233503b2d0", @ANYRESDEC=r4, @ANYBLOB="2c646f6e745f6d6561737572652c6673757569643d36377f38316b64652d7b6561362d376634772d753936322d35626136770037732c6d6561737572652c7063723d30303030303030303030303030303030303034352c646566636f6e746578743d73797361646d5f752c666f776e65723e", @ANYRESDEC=r5, @ANYBLOB=',\x00']) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000380), &(0x7f00000003c0)=0x14) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r2, 0x7fffc) 15:50:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f00000000c0)=[{0x3, 0x9, 0x21000}, {0x0, 0x7e, 0x1800}], 0x2) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:52 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:52 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x10400, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000040)={'bcsf0\x00', {0x2, 0x4e21, @multicast2}}) 15:50:52 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0x2000010a, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x200, 0xc0) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f00000000c0)=0x5) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0xffffffff80000000]) semop(0x0, &(0x7f0000000180), 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) fstat(r1, &(0x7f0000000100)) 15:50:52 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xfff, 0x40002) semget(0x1, 0x0, 0x2) r1 = semget$private(0x0, 0x3, 0xa) r2 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') clock_gettime(0x0, &(0x7f0000005640)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000005440)=[{{&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000280)=""/194, 0xc2}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/97, 0x61}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/136, 0x88}, {&(0x7f00000005c0)=""/210, 0xd2}, {&(0x7f00000006c0)=""/158, 0x9e}, {&(0x7f0000000780)=""/71, 0x47}], 0x8, &(0x7f0000000880)=""/156, 0x9c}, 0x1a4b3a3540000}, {{&(0x7f0000000940)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000001b80)=[{&(0x7f00000009c0)=""/148, 0x94}, {&(0x7f0000000a80)=""/4096, 0x1000}, {&(0x7f0000001a80)=""/237, 0xed}], 0x3, &(0x7f0000001bc0)=""/36, 0x24}}, {{&(0x7f0000001c00)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001c80)=""/49, 0x31}, {&(0x7f0000001cc0)=""/80, 0x50}, {&(0x7f0000001d40)=""/53, 0x35}, {&(0x7f0000001d80)=""/210, 0xd2}, {&(0x7f0000001e80)=""/85, 0x55}, {&(0x7f0000001f00)=""/171, 0xab}, {&(0x7f0000001fc0)=""/159, 0x9f}], 0x7, &(0x7f0000002100)=""/183, 0xb7}, 0x4}, {{&(0x7f00000021c0)=@can, 0x80, &(0x7f00000022c0)=[{&(0x7f0000002240)=""/127, 0x7f}], 0x1, &(0x7f0000002300)=""/96, 0x60}, 0x5}, {{0x0, 0x0, &(0x7f0000003740)=[{&(0x7f0000002380)=""/217, 0xd9}, {&(0x7f0000002480)=""/231, 0xe7}, {&(0x7f0000002580)=""/133, 0x85}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000003640)=""/106, 0x6a}, {&(0x7f00000036c0)=""/84, 0x54}], 0x6, &(0x7f00000037c0)=""/85, 0x55}, 0x4}, {{0x0, 0x0, &(0x7f0000003e80)=[{&(0x7f0000003840)=""/139, 0x8b}, {&(0x7f0000003900)=""/69, 0x45}, {&(0x7f0000003980)=""/170, 0xaa}, {&(0x7f0000003a40)=""/177, 0xb1}, {&(0x7f0000003b00)=""/129, 0x81}, {&(0x7f0000003bc0)=""/74, 0x4a}, {&(0x7f0000003c40)=""/151, 0x97}, {&(0x7f0000003d00)=""/48, 0x30}, {&(0x7f0000003d40)=""/145, 0x91}, {&(0x7f0000003e00)=""/112, 0x70}], 0xa, &(0x7f0000003f40)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000005040)=[{&(0x7f0000004f40)=""/98, 0x62}, {&(0x7f0000004fc0)=""/115, 0x73}], 0x2}, 0x1}, {{&(0x7f0000005080)=@isdn, 0x80, &(0x7f0000005380)=[{&(0x7f0000005100)=""/72, 0x48}, {&(0x7f0000005180)=""/37, 0x25}, {&(0x7f00000051c0)=""/25, 0x19}, {&(0x7f0000005200)=""/176, 0xb0}, {&(0x7f00000052c0)=""/189, 0xbd}], 0x5, &(0x7f0000005400)=""/47, 0x2f}, 0x2}], 0x8, 0x1, &(0x7f0000005680)={r3, r4+30000000}) accept4$packet(r0, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000005700)=0x14, 0x80800) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000005740)={'syz_tun\x00', @ifru_addrs=@can={0x1d, 0x0}}) accept4$packet(r0, &(0x7f0000005840)={0x11, 0x0, 0x0}, &(0x7f0000005880)=0x14, 0x0) getsockname$packet(r0, &(0x7f0000005980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000059c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000005ac0)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000005bc0)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000005d00)={0x0, @initdev, @loopback}, &(0x7f0000005d40)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000005d80)={'vcan0\x00', 0x0}) recvmmsg(r0, &(0x7f000000ac00)=[{{&(0x7f0000005ec0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000007100)=[{&(0x7f0000005f40)=""/26, 0x1a}, {&(0x7f0000005f80)=""/137, 0x89}, {&(0x7f0000006040)=""/26, 0x1a}, {&(0x7f0000006080)=""/4096, 0x1000}, {&(0x7f0000007080)=""/68, 0x44}], 0x5, &(0x7f0000007180)=""/5, 0x5}, 0x7}, {{0x0, 0x0, &(0x7f00000083c0)=[{&(0x7f00000071c0)=""/217, 0xd9}, {&(0x7f00000072c0)=""/207, 0xcf}, {&(0x7f00000073c0)=""/4096, 0x1000}], 0x3, &(0x7f0000008400)=""/30, 0x1e}, 0x5}, {{0x0, 0x0, &(0x7f0000008440)}}, {{&(0x7f0000008480)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000008c80)=[{&(0x7f0000008500)=""/92, 0x5c}, {&(0x7f0000008580)=""/213, 0xd5}, {&(0x7f0000008680)=""/237, 0xed}, {&(0x7f0000008780)=""/137, 0x89}, {&(0x7f0000008840)=""/166, 0xa6}, {&(0x7f0000008900)=""/67, 0x43}, {&(0x7f0000008980)=""/189, 0xbd}, {&(0x7f0000008a40)=""/93, 0x5d}, {&(0x7f0000008ac0)=""/249, 0xf9}, {&(0x7f0000008bc0)=""/179, 0xb3}], 0xa, &(0x7f0000008d40)=""/8, 0x8}, 0x4}, {{&(0x7f0000008d80)=@sco, 0x80, &(0x7f000000a0c0)=[{&(0x7f0000008e00)=""/116, 0x74}, {&(0x7f0000008e80)=""/234, 0xea}, {&(0x7f0000008f80)=""/106, 0x6a}, {&(0x7f0000009000)=""/6, 0x6}, {&(0x7f0000009040)=""/4096, 0x1000}, {0x0}, {&(0x7f000000a040)=""/81, 0x51}], 0x7, &(0x7f000000a140)=""/222, 0xde}, 0x1}, {{&(0x7f000000a240)=@can, 0x80, &(0x7f000000a600)=[{&(0x7f000000a2c0)=""/116, 0x74}, {&(0x7f000000a340)=""/28, 0x1c}, {&(0x7f000000a380)=""/213, 0xd5}, {&(0x7f000000a480)=""/232, 0xe8}, {&(0x7f000000a580)=""/122, 0x7a}], 0x5, &(0x7f000000a680)=""/235, 0xeb}, 0x4}, {{0x0, 0x0, &(0x7f000000ab40)=[{&(0x7f000000a780)=""/151, 0x97}, {&(0x7f000000a840)=""/184, 0xb8}, {&(0x7f000000a900)}, {&(0x7f000000a940)=""/224, 0xe0}, {&(0x7f000000aa40)=""/132, 0x84}, {&(0x7f000000ab00)=""/53, 0x35}], 0x6, &(0x7f000000abc0)}, 0x3c}], 0x7, 0x40002023, &(0x7f000000adc0)={0x0, 0x989680}) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f000000aec0)={@loopback, @remote, 0x0}, &(0x7f000000af00)=0xc) getsockname$packet(r0, &(0x7f000000af40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000af80)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f000000afc0)={0x0, @multicast1, @local}, &(0x7f000000b000)=0xc) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f000000b040)={0x0, @multicast1, @multicast2}, &(0x7f000000b080)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000b0c0)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f000000b300)={{{@in=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f000000b400)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f000000b440)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@empty}}, &(0x7f000000b540)=0xe8) getpeername$packet(r0, &(0x7f000000bac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000bb00)=0x14) accept4$packet(r0, &(0x7f000000bb40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000bb80)=0x14, 0x80800) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f000000bbc0)={0x0, @local, @initdev}, &(0x7f000000bc00)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f000000bc40)={{{@in=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6}}, &(0x7f000000bd40)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000010e80)={0x0, @local, @multicast2}, &(0x7f0000010ec0)=0xc) getpeername$packet(r0, &(0x7f0000010f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000010f40)=0x14) accept4$packet(r0, &(0x7f0000012540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000012580)=0x14, 0x800) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000125c0)={{{@in6=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f00000126c0)=0xe8) accept$packet(r0, &(0x7f0000012700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000012740)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000012780)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000127c0)={0x0, @empty, @initdev}, &(0x7f0000012800)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000012840)={{{@in6=@mcast1, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000012940)=0xe8) accept4$packet(r0, &(0x7f0000012980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000129c0)=0x14, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000012ac0)={0x0, @multicast1, @dev}, &(0x7f0000012b00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000012b40)={{{@in6=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@empty}}, &(0x7f0000012c40)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000013840)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000013800)={&(0x7f0000012c80)={0xb74, r2, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [{{0x8, 0x1, r5}, {0x138, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x39}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}]}}, {{0x8, 0x1, r11}, {0x170, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x100000000}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r12}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}]}}, {{0x8, 0x1, r13}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r15}, {0x100, 0x2, [{0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x5, 0x0, 0x2, 0x8}, {0x6, 0x69, 0xffffffff, 0x7fffffff}, {0x0, 0x7, 0x6, 0x3}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r16}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xb47}}}]}}, {{0x8, 0x1, r17}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r18}, {0x174, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r19}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r20}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r21}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r23}, {0x244, 0x2, [{0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x9, 0x80000000, 0x6}, {0x0, 0x2, 0x4, 0x2}, {0x4, 0x1, 0x2}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r24}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x850d}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x180000}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r25}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x101}}, {0x8, 0x6, r26}}}]}}, {{0x8, 0x1, r27}, {0xf0, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r28}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x100000001000000}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r29}, {0x1ac, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r30}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x80000000}}, {0x8, 0x6, r32}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r33}}, {0x8}}}, {0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x44, 0x4, [{0x5, 0x3ff, 0x764, 0x3000}, {0x9, 0xd38d, 0x1f, 0x6}, {0x79, 0x5, 0x5, 0x5}, {0x80, 0x3, 0xffffffffffffffff, 0xffffffffffffff00}, {0x0, 0x0, 0x1}, {0x9, 0x5, 0x3, 0x6}, {0x7fff, 0x2, 0x9d9, 0xff}, {0x8000000000, 0x100000000, 0x8, 0x10000}]}}}]}}, {{0x8, 0x1, r34}, {0x98, 0x2, [{0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x9, 0x40, 0x80, 0x3}, {0x7, 0x4, 0x1ff, 0x3}, {0xc6, 0xf0, 0x5, 0x6}, {0x0, 0x3, 0x0, 0x1}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r35}}}]}}]}, 0xb74}, 0x1, 0x0, 0x0, 0x4008004}, 0x4000) semctl$IPC_RMID(r1, 0x0, 0x10) r36 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8afa, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r36, 0x84, 0x65, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0xffffffffffffffff, @empty, 0x80000000}, @in6={0xa, 0x4e23, 0x5, @remote, 0x9}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e21, 0x3d5, @mcast2, 0x6}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e23, 0x6, @local, 0x3}], 0x90) 15:50:52 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080)={0x3c, 0x6, 0x2, 0x3f, 0x3f, 0x40, 0xfff, 0x2, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={r2, @in6={{0xa, 0x4e20, 0xfffffffffffffffc, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x401}}}, 0x84) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:52 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00') ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000380)) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r2, 0x7fffc) 15:50:52 executing program 4: syz_read_part_table(0xffffffffff7ffffa, 0xffffff5c, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) 15:50:52 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0x7fffefdc, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x1, 0x800) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f00000000c0)=0x8) semget$private(0x0, 0x0, 0x40) semget(0x0, 0x0, 0x400) semget$private(0x0, 0x3, 0xd63a51bedcf9fda2) semget(0x1, 0x4, 0x282) semget$private(0x0, 0x1, 0x1) r2 = semget(0x2, 0x3, 0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x3d) semctl$IPC_RMID(r2, 0x0, 0x10) 15:50:53 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x3f, 0x2000) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x5, {0x7, 0x1e, 0x1f, 0x10000, 0x0, 0x7, 0x400, 0x6}}, 0x50) 15:50:53 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x1, 0x0) setsockopt$inet_dccp_int(r1, 0x21, 0x7, &(0x7f0000000140)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) socket$inet(0x2, 0x2, 0x9) 15:50:53 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x2}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:53 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000380)='trusted.overlay.opaque\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x3) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000200)=ANY=[@ANYRES32=0x0, @ANYBLOB="24000000762fdaf56d2ca1414bf7d729d69d9df96242faaa532632be2dfc04ba06000000000000003930f9"], &(0x7f0000000100)=0x2c) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={r2, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x20}}}}, 0x84) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semget(0x0, 0x2, 0x0) semget(0x2, 0x1, 0x80) ioctl$SIOCRSACCEPT(r1, 0x89e3) r3 = semget$private(0x0, 0x3, 0x209) semget$private(0x0, 0x2, 0x5) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) semctl$IPC_RMID(r3, 0x0, 0x10) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000240)="491c767a1bfa3ea8cc9c0be89f59cd93f0b5533cc932f31f85bd35164a2558f2c2a31f314347759daf68b1b0953efaccf16eb9bab3342882ce67392025862857fc542fc91c6016b85a3d7898f4ea1ca50847abb5db4f3f1c762a68ea226b03b92cab02282715c9de0c06265e119c0c297b60e03335be63ae3aa1d1b4b4438a4d7a7147545cd489b9") [ 1756.283059][T14898] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:53 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7, 0x10000) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000240), 0x4) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x141803, 0x0) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f0000000140)={0x0, 0x6}) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x537c, 0x430000) read$rfkill(r2, &(0x7f0000000040), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='-\x00', r2}, 0x10) 15:50:53 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x120000000000, 0x10000) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000080)) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x5, 0x2) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f00000000c0)={0x800, "46a4faf469887f8a4b5366119e3c1508af3f0e7f050dbabe681ff6a1c8553507", 0x1, 0xb743, 0xccb, 0x0, 0x4a4eaa7947ce1e77}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semget$private(0x0, 0x0, 0x1) semop(0x0, &(0x7f0000000100), 0x2d) write$P9_RCREATE(r1, &(0x7f0000000140)={0x18, 0x73, 0x2, {{0x4, 0x1, 0x8}, 0x1ff}}, 0x18) semctl$IPC_RMID(0x0, 0x0, 0x10) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="02000000004000003e0b0000000000001a400000000006000000000000000000"]) socket$tipc(0x1e, 0x5, 0x0) 15:50:53 executing program 5: r0 = semget$private(0x0, 0x1, 0x40) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000080)=[0x80000001]) semop(0x0, &(0x7f0000000100), 0x2d) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000040)={0x0, 0xfffffffffffffffd, 0x30}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={r2, 0x7, 0x8, 0x3fff8, 0x4, 0x9}, &(0x7f0000000140)=0x14) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:53 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x6044, 0x24000) mmap$xdp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000000, 0x50, r0, 0x80000000) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/244, 0xf4) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:50:53 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000380)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x400) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f00000003c0)=0x1) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) clock_settime(0x1, &(0x7f0000000340)) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r1, r2, 0x7fffc) 15:50:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x9, 0x840) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f00000000c0)={0x5, 0x3, 0x5a, 0x8, 0x4fc1}) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x4) 15:50:54 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semget(0x3, 0x3, 0x24) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:54 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x3}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:54 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x20200, 0x0) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) 15:50:54 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@rc, &(0x7f00000000c0)=0x80) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) 15:50:54 executing program 3: r0 = semget$private(0x0, 0x4, 0x4) semtimedop(r0, &(0x7f0000000000)=[{0x7, 0x6, 0x1000}, {0x0, 0x80000001, 0x1800}, {0x2, 0xfffffffffffffffe, 0x1000}, {0x7, 0x3, 0x1800}], 0x4, &(0x7f00000000c0)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 1757.215046][T15402] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:54 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x41, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000040)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) syz_read_part_table(0x0, 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f00000026c0)='/dev/dsp#\x00', 0x7, 0x402) accept4$x25(r1, 0x0, &(0x7f0000002700), 0x800) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:50:54 executing program 5: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:54 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r1, r0, 0x7fffc) 15:50:54 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000100)={r0, 0x0, 0x6c, 0x9, 0x4}) r1 = dup(r0) ioctl$SIOCX25GDTEFACILITIES(r1, 0x89ea, &(0x7f0000000040)) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000000080), &(0x7f00000000c0)=0xfffffffffffffd8a) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x200, 0x200000) 15:50:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:54 executing program 5: r0 = semget$private(0x0, 0x2, 0x80) semtimedop(r0, &(0x7f0000001740)=[{0x1, 0x1, 0x1800}, {0x0, 0x4, 0x1000}, {0x4, 0xffffffff, 0x1800}, {0x0, 0x7fff, 0x800}], 0x4, &(0x7f0000001780)) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(r0, &(0x7f0000001980)=[{0x5, 0x9d6}], 0x1) semctl$IPC_RMID(0x0, 0x0, 0x10) r1 = request_key(&(0x7f0000001800)='encrypted\x00', &(0x7f0000001840)={'syz', 0x3}, &(0x7f0000001880)='mime_type]c[)keyringvmnet1:,\x00', 0xfffffffffffffffa) keyctl$clear(0x7, r1) r2 = fcntl$getown(0xffffffffffffffff, 0x9) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000018c0)='/dev/hwrng\x00', 0x1, 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000017c0)=0x0) setpgid(r2, r4) ptrace$getenv(0x4201, r4, 0x1, &(0x7f0000001900)) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x9, &(0x7f0000001600)=[{&(0x7f00000000c0)="c79d2b6c247dd5bfaea2e150ba7a8454c196a0f260b3124f8996850bf0624de4076f3eb54de972f031621395ff85ab387f324498af5ff632c6b8023a00", 0x3d, 0x4}, {&(0x7f0000000100)="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", 0x1000, 0xff}, {&(0x7f0000001100)="41933ad0437989c3fb8adbca895b8cc539caf694aa51e07af39d733e37fe2c5a960342ad34b3d73072e8af351e77817df804f044e5173fafbd0e531edeba4bdfa53799bffc76bb6950b96500df5dc45124f3c61c207fe7b552adcb17b6c508e325d1094aec63e3c623c322bb83acf6a15a7d8af1c4c3174f092696a22d08ec2a033d50c0e93bd6e486bbda9562f60c6b", 0x90, 0x7}, {&(0x7f00000011c0)="bdeae48c1e942e6d7386d6b7567ac08e565f810efa3a20736ed2a64ac791e6991fefc4813d6365d11bd714314a2fdde22de1ce3818e045894e3ac71410f2637b5f504a2412125bddce973908204686c5bbdaa9ac3e7903c8188f86a0678eb2cabebe60ccf06ab3037f5d82910b0adfd452eb7591b1ca45c04edee68dd9e77dec3a33d937ee6ebe248c2b1e2e996a3637f06f6e429e8067a640327deac13473e6ad68b049e75b524fd3794817427401f6092621b7ff321907376dbcfa889f487a2a228a8c96fdd1a727376befd619a1779d50695373ef217aba98abcf917e4c7e581a1aebc24a33d48a57", 0xea, 0x1000}, {&(0x7f00000012c0)="5c4a7bdd69833fd59b9de3da05727a75456ba526149bd212b0ba1680a0ccbb33614a0158f5e86e8544b11d5bb9cf8df03947233bd8e06e8041b37d4e51ada8f600eb9313cede", 0x46, 0x3}, {&(0x7f0000001340)="6df63a71c3aba033524aaaaaa1fbb4db2ed1b220c6282c328e4a9af9533f1cb319273f1c377f4a97c966b2403eb4373c2015b10e60f06f7ca46e166cf66365cefceafc6d9f639640ec68bd29038aae8b31b882483cf7973e78a5fc2dbf200833e1c48873fc74415c04e49fd30233d6762b6b4fb1436ade0844c0caa7ad0c1e802a7f6051270323aa", 0x88, 0x3}, {&(0x7f0000001400)="0b75b4fd5516f18996e0f12e009927fa1c6a3bc3a88a711b7b11bdda590344567df040ca50093acc", 0x28, 0x2}, {&(0x7f0000001440)="8f7113f2ca643a05c7bd0fbbd89597149f44552bdf7625c86a78398f982fd13afe36f379864a18100a3c1bba78d031140022dc93afacbdf419dc325df8710577949e5ad43e992ef3803ed11cfe1d07d339c70f29d0cfd3b9b80cf3cd9fbfc5d9e672c5125ed1b5f4959fb96501f17414ce72129a35395757f2b86970b07ad1254e572ce596ef71c5c28b53b8a0619cd3", 0x90, 0x42}, {&(0x7f0000001500)="e57ab47ccd1c66060ddb7bdc955a97d566d5b2ae1c7446e5c40d8a71c6edff3c5aeb8b850761b4fe94358c38401bf66e5e66c752d5b28ce1716ca010121b6cc472882f588174bbee633e4eececc3d41516c2ff20c76ad05feb8bd87e6129f2185cae8fa89c8e772b03e6a18ab1ab5c89a02916a58aeffa87989734aaca97540dfe2accb56134e08ec966e0b77573f67091b0a47e6f4972b19c865dccfa39398bc4d4c789094f7e92583cf77e71f6f0c9a334687172c1c7cd7815a13089150b5d037da7b89b01e2d8ab42856e3c75face53de067d5ad5467ab32df874a9d20eea7e0e3eaab20ecfcd9d0003d47d", 0xed, 0xffffffffffffff6e}], 0x10000, &(0x7f0000001700)='\x00') 15:50:54 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='./file0\x00') r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x400, 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="2f6465742f5c57bf73673000fa731c8753b40409e770d0e42a393bbde30b732fc2165085fdb9e0893a058054b29ee62cdad0233219d3d79174e5faef7822aa4b2a2cd5431d806d"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ubifs\x00', 0x44000, &(0x7f00000002c0)='nbd\x00') r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000440)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, r1, 0x10, 0x70bd2c, 0x25dfdbfe, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x589}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) 15:50:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) readahead(r0, 0x9, 0x4) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x3) 15:50:54 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x4}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:54 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000000)=[{0x2, 0x65e, 0x1800}, {0x4, 0x7f, 0x1800}, {0x2, 0x2, 0x1800}, {0x3, 0x4, 0x1800}, {0x7, 0x8000, 0x1000}, {0x33382640ebeb0f5e, 0xfffffffffffffff9, 0x1000}], 0x2aaaaaaaaaaaac85) r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xffffffffffffffff, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f00000000c0)={0x7b, 0x0, [0x400, 0x7fff, 0x8, 0x8]}) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:54 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) perf_event_open(&(0x7f0000000100)={0x7, 0x70, 0x6, 0x6, 0x8, 0x3, 0x0, 0x4, 0x100, 0x8, 0x0, 0x80000000, 0x10001, 0x79, 0x9c6, 0x1, 0x3ff, 0x101, 0x9, 0x20, 0x2, 0x9d8, 0x2, 0x7fff, 0x7, 0x3, 0x25fd, 0x9, 0x2, 0x7fffffff, 0x7fffffff, 0x1, 0x100000000, 0x3, 0x6, 0x401, 0x7fff, 0x0, 0x0, 0x1de, 0x1, @perf_bp={&(0x7f0000000040), 0x7}, 0x80, 0x80000000, 0x200, 0x9, 0x7ff, 0x80000000, 0x4}, r1, 0xe, 0xffffffffffffff9c, 0x8) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:55 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000380)='trusted.overlay.upper\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="00fba2027fb93ef8d3e2c96357ee9178a1d976e7a7ad596780aef824f938bc469121edf6d046dcb94ec56dbc5308173b900d2d83fcd5d251a727992d53811d65ac393d0450d9f86989b45cd1878575d468f0890e7ecb337f992316b71c20fb2098f27db2dd26acac95a452f684db82c007638311218287ebd418b826a2e90946da3bd3f62e86e12a75fe7e5e5944810f5721b4624ecb603ef9033cf74605c7096bb8"], 0xa2, 0x2) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) [ 1757.893030][T15833] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:55 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r0 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x7f60, 0x20000) ioctl$VIDIOC_G_AUDIO(r0, 0x80345621, &(0x7f0000000280)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000100)=&(0x7f00000000c0)) openat(r1, &(0x7f0000000140)='./file0\x00', 0x101, 0x1) fsync(r1) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0xc00, 0x0) 15:50:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semget$private(0x0, 0x3, 0x6e5) semget(0x0, 0x4, 0x10) r1 = semget(0x0, 0x3, 0x2b) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40000, 0x0) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f00000001c0)=r2) write$P9_RREADDIR(r2, &(0x7f00000000c0)={0xc5, 0x29, 0x2, {0x4, [{{0x28, 0x0, 0x3}, 0x1, 0x100, 0x7, './file0'}, {{0x18, 0x1, 0x2}, 0xf96000, 0x1, 0x7, './file0'}, {{0x8, 0x0, 0x2}, 0x400, 0x3ff, 0x7, './file0'}, {{0x0, 0x0, 0x1}, 0x800, 0xaf0f, 0x7, './file0'}, {{0x10, 0x2, 0x4}, 0x3, 0xdc, 0x7, './file0'}, {{0x16, 0x3, 0x1}, 0x7, 0x3, 0x7, './file0'}]}}, 0xc5) semctl$IPC_RMID(r1, 0x0, 0x10) 15:50:55 executing program 4: symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:50:55 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000100)=0x8) setxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) r1 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x3ff, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000200)={0xffffffff, 0x1000}) 15:50:55 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') lsetxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@sha1={0x1, "c6617947ecd1d507afceb2448330aebd28371a75"}, 0x15, 0x3) r0 = syz_open_dev$vbi(&(0x7f0000000300)='/dev/vbi#\x00', 0x0, 0x2) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000340), 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x0, 0x0) r2 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) ioctl$VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f0000000380)={0x0, 0xe6c, 0x200000000000002, {0x1, @raw_data="f837dc35820fee9e3e12528392a50ba589fcab127dc37c602aa5b60a33cf28c041ec375c85694c8d718c0c5d4c46df75adbbcc55178f330e19aca25243dfcd609bbbaef18fd7c761b6000babc3ebc15f86c936fb31cb887493e35d10c4e45792692dcf730969df11f29d48e118d5be8c83996137b3970a9c0f50fda94f545a991cda39725cbe977602c2b81b1020457d8fa1818073b1e944e409d1916675a336bd24121996cdb455cb6e111a397b29865c2520f46dfd3e29a7baedf3753355f16210e0f3d5c5611b"}}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0x7f, 0x7}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000240)={r3, @in={{0x2, 0x4e20, @local}}}, 0x84) 15:50:55 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8, 0x101000) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f00000000c0)=0x2) ioctl(r0, 0x1000008913, &(0x7f0000000140)="ebbed500100000c4a970") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000100)) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:55 executing program 5: r0 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$TIOCSBRK(r0, 0x5427) r1 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x3, 0x2) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={0x0, 0x1f, 0x30}, &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000280)={r2, 0x0, 0x200, 0x52, 0xfffffffffffffffe, 0xff}, &(0x7f00000002c0)=0x14) ioctl$VIDIOC_SUBDEV_S_CROP(r1, 0xc038563c, &(0x7f00000001c0)={0x0, 0x0, {0xddcb, 0x6f30, 0x1, 0x1}}) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) r3 = semget(0x1, 0x0, 0x2) semctl$IPC_RMID(r3, 0x0, 0x10) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x80400, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r4, 0xc0045540, &(0x7f0000000100)=0x93eb) r5 = getpgrp(0xffffffffffffffff) sched_setattr(r5, &(0x7f0000000140)={0x30, 0x3, 0x1, 0x4ad1f981, 0x62, 0x800, 0x7ff, 0xdad6}, 0x0) accept4$x25(r4, &(0x7f0000000040), &(0x7f00000000c0)=0x12, 0x80800) 15:50:55 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x8202) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000380)=0x5, 0x4) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r2, 0x7ffff) 15:50:55 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x5}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:55 executing program 5: semget$private(0x0, 0x3, 0x1c) r0 = semget(0x2, 0x2, 0x704) semget(0x0, 0x2, 0x2) semget$private(0x0, 0x0, 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:55 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@mcast1, @in=@initdev}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) r1 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x101, 0x10000) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000300)={0x0, 0x400}, &(0x7f0000000040)=0x88) setsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000080)=0x3ff, 0x4) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000380)=@sack_info={r2, 0x80000001, 0x4}, 0xc) 15:50:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x20a02, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x148, r2, 0x1, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000001}, @IPVS_CMD_ATTR_SERVICE={0x54, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x50eff88a30fa33bc}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2c9d}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@remote}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vxcan1\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @empty}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x22}}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@dev={0xac, 0x14, 0x14, 0x16}}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nr0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8c8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1ff}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x4}, 0x800) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:55 executing program 4: syz_read_part_table(0x7, 0xfffffffffffffefc, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:50:55 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40100, 0x0) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0xfff, 0x40) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000100)=r1, 0x1) semget$private(0x0, 0x3, 0x8) semop(0x0, &(0x7f0000000040)=[{0xfc87f0e3499cdc25, 0x3}, {0x5, 0x6, 0x1000}, {0x3, 0x1ff, 0x800}, {0x0, 0x6}, {0x3, 0x7e2, 0x1000}, {0x6, 0x0, 0x1800}], 0x6) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 1758.648925][T16249] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x200000, 0x0) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) r2 = semget$private(0x0, 0x4, 0x6) semctl$IPC_RMID(r2, 0x0, 0x10) 15:50:55 executing program 5: r0 = semget$private(0x0, 0x0, 0xd9) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000000c0)=[0xffffffffffff7fff]) r1 = socket$caif_stream(0x25, 0x1, 0x3) ioctl$sock_proto_private(r1, 0x89e4, &(0x7f0000000000)="72a55fdfcb615f5aa14fa5d6f4d11f0d629762c959154295491fd45b21e1fc73831fc93abfea51def0fa0a4b3641e8b637d5d05a8829fd652a393bd3e4c504fc657cfbb9cd02ced4233fb1") semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:56 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x100000001, 0x0) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000040)=0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = socket(0x400000000010, 0x3, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000040)={0x100000011, @dev, 0x0, 0x0, 'lblc\x00'}, 0x2c) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x42001, 0x0) r6 = socket(0xa, 0x8000020000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) ioctl$sock_ifreq(r4, 0x8932, &(0x7f0000000100)={'veth0\x00', @ifru_mtu=0x54187c2a00}) write(r3, &(0x7f0000000080)="2400000019002551075c0165ff0ffc02802000030011000500e1000c080003008000a000bc0000008f3943793a5ea67658cb22d90000000000000059b97dc8f8b550e66a2bff77c4931da84157f7a733686a22fd8169f6b6b4f464000000000000000085ea2b85d32b3583d87124da3b0861e2cc000000dcce1fb4ac2cbd48c8378a3ad82a5b83c01295723da595c4831f65123819e204853d48a5a6bd525801f1cae983cf4544a9c4c396f36e85787a8efc32e0015c85ead2b748bc6a5fefc4e53543f9f65e3da31a110af1ac968ce510c7a70723741b34981d1b182deb7904", 0xe0) ioctl$TIOCSTI(r0, 0x5412, 0xfffffffffffffff7) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r6, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r5, 0x20c, 0x70bd26, 0x25dfdbfc}, 0x1c}, 0x1, 0x0, 0x0, 0x8801}, 0x0) finit_module(r6, &(0x7f0000000180)='{\x00', 0x1) r7 = socket$inet(0x10, 0x3, 0x6) sendmsg(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000080)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) syz_read_part_table(0x200000a, 0x335, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x2a) 15:50:56 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20ncci\x00', 0x20080, 0x0) ioctl$RNDGETENTCNT(r2, 0x80045200, &(0x7f0000000380)) dup3(r0, r1, 0x7fffc) 15:50:56 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xffffffff, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r1, 0x40086409, &(0x7f0000000100)={r2}) 15:50:56 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x6}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:56 executing program 5: r0 = semget(0x2, 0x3, 0x101) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)=[0x1, 0x5, 0x60, 0x8, 0x2a6cda7, 0x7, 0x8000, 0x9]) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 1759.170001][T16458] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:56 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x400, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000440)=@mangle={'mangle\x00', 0x1f, 0x6, 0x608, 0xc0, 0x460, 0x1d0, 0xc0, 0x1d0, 0x570, 0x570, 0x570, 0x570, 0x570, 0x6, &(0x7f0000000380), {[{{@uncond, 0x0, 0x98, 0xc0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x3, 0xffffffff, 0x0, 'veth1_to_hsr\x00', 'bond_slave_1\x00', {}, {}, 0x5e, 0x3}, 0x0, 0xe8, 0x110, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x11, 0x7fff, 0x8, 0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @TTL={0x28, 'TTL\x00', 0x0, {0x1, 0x101}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, 0xffffffff, 0xffffffff, 'bpq0\x00', 'syz_tun\x00', {0xff}, {}, 0x19, 0x1, 0x1c}, 0x0, 0x128, 0x188, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x0, [0x100000000, 0x4, 0x1, 0x5, 0x4, 0x1ff], 0x8e49, 0x20}}}, @common=@osf={0x50, 'osf\x00', 0x0, {'syz0\x00', 0x1, 0x8, 0x0, 0x2}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x8001, [0x4, 0x549, 0x3, 0xfff, 0x2247, 0x6], 0x6eb0c947, 0x40}, {0x6, [0x10000, 0x7, 0x9ddb, 0x8001, 0x6, 0x8001], 0x29, 0x3f}}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x21}, @multicast2, 0xff000000, 0xffffffff, 'tunl0\x00', 'team_slave_1\x00', {0xff}, {0xff}, 0x16, 0x1, 0x48}, 0x0, 0xe0, 0x108, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0xa7ce, 0x10000, 0x2}}}, {{@ip={@multicast1, @multicast1, 0xffffffff, 0xffffffff, 'veth0_to_hsr\x00', 'rose0\x00', {0xff}, {0xff}, 0x1d, 0x0, 0x28}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x9}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x2f}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x668) sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x204}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x1a0, r2, 0x300, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0xd8, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e24, @rand_addr=0x8001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffff81}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfc7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e23, @remote}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'ip_vti0\x00'}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}]}, @TIPC_NLA_NET={0x54, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x100000000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x18eb}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x50}]}, @TIPC_NLA_LINK={0x50, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x24000001}, 0x4) connect$inet6(r0, &(0x7f0000000400)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) ioctl$KDDISABIO(r1, 0x4b37) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:56 executing program 4: syz_read_part_table(0x2, 0xfffffffffffffec4, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x101100) pwritev(r0, &(0x7f0000001680)=[{&(0x7f0000000040)="2243c17b001a8d12871127ce66d7f5b784af75bbc4f581631f5d788f6b948fe32fbc4435b093ea8adb7168b112743090e9e35fe785f17c438b061416ba5c3ac28e2e746099034eb254a2c582e2314b23efca", 0x52}, {&(0x7f00000000c0)="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", 0xfb}, {&(0x7f0000000240)="63a9a578db6cf2d6f11a230764b879ab9aeb5f6db798c0e1b0b3c4c5501a6bcb5cff87054b2bc0904c6a60ae60cd4edc034e5b507998599a65aaf4033af25b4bcabea91f5d1ce048999fb167d70759e06b01770dbec88c76366f299d029f62c73664f6d7cd6f74c8f207b0b4dde1aa167a3386370f9712568eb5c5c9f0e8f1ae521fc26dce8a5278e174cbd5d33362bfb08d1bbaad92a3652f0d90aa02829ffd222de03ea5b033eee9fe1e0ce70db242bde30dbc6ac35ff1331542c96b31b2066c213435a58449165411d3bf8cdd10a35602ed2ab20cb61d4a85a6ea5251ab1338c706c5dbeb2d9304cc2c8d23d37912c881c51eb200bc509b1e54424c05e5eb68035a8baea19f09cf6af0157c9416d2607e37b700ed93c13dc90fda8c132e34708f6dc28c15104f4d4542a8f40d5fa07cefe912e1bd9371a2c19bf197442d3561f4cb9edb80ad7055c1e5b7926866bce4ce0d5c74ffe2622bcbebd557a217a9dc5730ddff5efc4050d69a85cdd12fd7d460e325eabc268c60a982534c0e7ef233261d809d6cac152442ff591b6fc62f9eebb6995e7d5e0797e32b7823598d6cd3444a2475ca52ee5ca401c849c6fc26b2b6bf33f62dab17cc194e5ee1fc624e8294a0773dc382f55ce7432f889c19fd0939c6e88ddeee41395cb35fb61d26bb8679c4d956f758445b51b32725442b71cc9427d9955789768f6095f8336a431bced98228732637e34fe55ea2c7ab9ea021a6bebcadf274ea5a30210acccb8b6f0db1423749a693642ed9fb5cc797bd46ace91e69634bf52e2492302e42440544076693d71c02d269311bc25e8fa081ae9136d3ecab75517239171b350ce9c8ca668a47e8c866d5d47d4fd2508dd04db1953bc4e876c040adf3159beb9f389d8cd65b652f51ab4c73f7c157e2219bea81408f769719f70712bf1945394b77bb91ed480b13b53ec5f8a6484a027f7d3af96d4b5208ed0241885e85410467ab8e328ba98e8ca36af69d1e7dce2b408b13dc8209ccb00e501a10aa22b13417794a6c1ccca79573e057d0b50431869319dcd648a233726bf95c8852ecfbb6aac5414e9fadd3cd89c8457275ad6c7d05e5ac00fedb96edecd3176af991afc9d37ab20ac156dc6341f708c9fc2ef0aee8dd6ee272fbdcf444ffc4dee9d4c44ead72aaf50eb3aefa5490defafb50205302bc57cdc5cd8545d7d9536d87855e0f63758ceab1ecc2828d4b7e20dc292c98ca22bb28489d4247d65c27129e8d295f63bb05be4002fd51fd870f8df236bd90f9fed8197cbf6d46ede51cef3492b3ef264ed14b760c2d5217c6675cd4a5d0d7a2b233a05ffaa4801298a1f1c3921ea2a4962716509d285266ea42915ef80a0fd5978262926fce7849c9f75746a0d11a3abe7d4602a089691dbb653e52aa7ccda4dea8e958d2650612d1e7efb3e07d55e02085b01b92c7a83dbde8b92c53b4457da7ecf4055ee1c9fa34e0128bc30c4e7968342f959f52d3b16ec874523dc13765ed78bb44873f6a422f384225af8ea7cb0e98f55c37d432ec9c441f2f9dfcea92d9e4778a368d4451dd076d5b914953be45d725a748f6f86c0ebda252e62726bb0215ae9070a86f740136d950fd34f9635591c9da8ad48bed69c055ec99eaf1f62102b2a75f6b619df3b63420226500d4ff43e0800f978948bf4e4e0bf7f0428fa8fd62824af8d9c76838a074efdbdcc06b7c992aa6e36ce6e86c1f4096e2ab72f247bd5115859f12a69736a6f9e4aa47722458bdf89e2023953dee199e83f2b52440bed57937a36024ce255898e4c8445f6f953163e61b45d8c98e37fee3fcd31a19f3fb6d9ab5aa7e45463e6e581cf00bd9779d93eb8434f1d2fe9059ef4cd98d45b63961506124cb7e73960471d8b0b0599487ec1db24a9affee46573621c0a8e4e1978fa93f2b4925960b2b53a7b0d42783255d03160d974f7c1bc80e4f396b46d6013d35e2cc8479b63401affba06d0dd6046dd4e9677dcb320841ab1cd6d13803c4b67f188bb148aa2ab0e79764a11710655659c0f17ceeb185407667bc2ccd08ae06556f639c2cd6d4690754b81b92ae4e44cc8525468915caa187a5ff7c94c5376dedb9c80efa0aad6af5466777b088bf4f67832622348a6c6489dea9208ca0182b3e8c0540857180cc8daa418670b6ca03cc4f69c781a2ca2870877a7800cf90d5e3f9b3e7c98d2155a08793fa316a9124bf019fed0fa33f497d2db4736d6ce66c0c344e2b49199f6174290b57d34756c3ca6d1d890ad11d13d115b7599ab167edf22f833289b2cfc3ac16414558ff735f38e6fd140251eac070d04e9cc82ce20627fe4beda9db40271688b76d9adb755311e75195f8cbf4f53815e81929525e43d71618a0bff1e296e8772a6fc6943b99e96cb5cfd17747279a7a704819a146f29aab9df9ea4942cf9434ad93527450a4ffc27e203e7ebcfb8fc257cdc9231ff7b440875b20da12fe9aebfb91456e500bf8db238964e6a4975bec68692a58e82bb00477dd5755acd2645eddec000cb0afb5874b548e9069710f1d533ee9f201c3dd93b8a268f692a50531f2f7112b757342cae120060a230301137adbb7837f17c3d2a83723b59d24f3c5a0d9cc2b65858c30ca8b1a63b723542a4d4c16a9c18e662b91ebaf626a02db157526efcc154e0837084dc0c1b1b2c07f305b39546d0e14e364425a41bf42dd61db281465c0ce8a5bef1dec39352f74ef15fc24d33dc5b536b3d0088fd066cde9c642adb13e7bf622b1178e064818b7a8200f505e24e4d815b5da66dca39acf4b4e98cc3eff4909a842ed750511511ecd9ff46a53b28687cb46f7d6737f6cf7303064a4ce90f3e01bbe528e281bbe1a71bd33950a25cf24848c6b338f978c2fbf8d7f798fae41eba281658edc952339208baaf4ae12061f1823782b63fa70c6c739e5ed3837cd4802da41b732971a4b05ad87bc4898632d0bd9dc2ab474184a688b2a6377d2e79beaf4dcc1901927029ce52c79e456a31292704ffd9a3045ce95b1be03e1ad8dddcff3138d798bda89558d75f57fa2f947bb1ed2dae216513a537a62c6ca782d0fb3d073e69a8a3d7092d44995fbd2cc02d88739378c9ba9597f47e9447b960832d2bfbda126a2a17b854260f4159e30ab79543aca5dc9f52ff9ee790fc4bd5ccad629b82c509d136b1de716c5ae4426485595ecc9b52d27d9d53b3ad0dfa7c46ed8603fc3cb68b881df4959b70212670af9bb7e4470be043645e083c7d0a30e3cd9545de27ab73206a008a621c08249ed899b6caed1ab2a58e7b4dd1e455311c89d3862f7e75e89331d9503080c2fec0ed05efa1bca3132054696f2f50c54913e50943dc3cf4bcf04b2d1b5834ba283ec12c74b316e637e85df88e5392a940b2b5de6ffe0660c3f6321d39bb104a48b2195725b091f1f910b7b4d9fa16bf3e4c429db25dcfde51865b42e32e546e23cffb7eaf42984be7e02106ba075fa805efccd64a19ceeafefd4a6cc5d930609fd34c4bd6e200c287eb7f1ab322c0a63a668b3c715fb7c108a75605528cd7dd2d13f2f1884f9ec937a744745fb7c857cce8238738226fee5a117efd25f0e0da55cfa21a869cf933136a14721f70af57e088abb114a848c8976ad565530e2ebb47c24f1b4ba3a8615867d5438d4e4200a8cf12f771172c023caf7f8db1e30d1ccdbdd0f940fd5775356ba638239d198ff1008cc22ec2237884ca3c2792bfc1bdc7815cbbbc8cc5a5b7b8f92324b45318d8e256d785628c7919c9e10897d944c30b3234ed61162dad6d2079c06c0d3e8d1ed8dfbd7298ea0396a96b80209e839ce20f09d0506d950163080f0df92aab72d7d27f494ab8543abc11be73de485cb9d92f16d1c613bcc347e848565cf3e4094e7cc27d74be8abe6b2d34567a1b2ce03ab628685a2f712ce4addf0c21bf246aae1840fa3ff1e8429030c4990daf74e527fa70971aa0ec1a73e215ed817daa516d82ebade4a8f7235adbbe4a7150da9262a82def5dba84e82b86f9bcf65f59f487f524daae00bd79980a3656bfe82294652e1871c40c79fe8fca03232abfed8953ab33d4f58da3d2fd53504bd393ce4000909c44a675de13bbf91844641fba02a18526a299e43848d611b9738530cc77b7a18c1d92728d4f1e98453eea8c2e85ef9515cb0cdf9c16409ef9c9f0fcc03d4dfbdebf6f3f4c0d33fb02cabf8163dcb0d7084dbc8d525201be352a562de4d3a198fef3fc519e8c131a0a3cd760f1ad7c9f0d76dfdc7480c979f582016d3e3ccb57d3f83e16a073cf22e21e4080da5b3c8d43eac61a0dd2a33fe0c22a761d582a9996f04cc83dd022b1377ea06d478ad4f4c0baa0d99beb07ce5edbc6b1de4a24a9dec28fe56b8f0ec9e6717d41f714f8edd49f4f158b8d8f718c4c39de2c77187ae6bd2a3cd9e520ec7e961e784fef8c98a5409423eac41ffeb729241b8a434905b5ca61eeb0c74d11c57fbc82ebbec8ac51a0ecff3e657e915e7b5282db01c4e0a07256324580a0ab6546b1d7316546daa8fd24be74b9ee9e15f711f7a8ec33b09e56b86444d171e6d72d571a8cc13dcace0d8192a7d0c76012a58a814f3b5e1d82c4da82331a0afae159eea946bdb60870845688dab8560422a2162c33fcefb17c7e9d0d79e1a1334a618f4ffa5d05ab154681282a472d3aa312acd41dbc6a366d94485b2b60eab23de9ecd5f8e52a99d2d1a89102f9e1d13505c70d2720b9ebd696de6dacd3c35014abdfbacb1cb6f71753711aa3d6bc4310509c9a2231cb21563eceb032602b5e7dbe0b6e38ca9f697516af128f6a25f5758c35836d67d9fd2fbff1703e6ea635ec48a6ce6cf7c634a3aa7369021b92fb6c46d097154e56f69baf5b61d759fc784e54caac8752f6e9cb4e8303bbed9ae702152ee46ba6935f4c6cf99ebcf483e1c140b70f710c97779583d45c474234d222aab1255a8d61ca0f74735fb663c9efb486c53483f0b084b01ca902cb192bc47e669abb20fe6f321602f6e3c7f9509b330d3e44a21391f57c894e3913ba80ab0d4b6e5f7d4858d45a8475dd255e423ff5629410a0de9362841a21aaad2d2f1fec9407d1a9aa8e298ddf33472d1603fc1e0c76b8aa93bfb762a66352ee665dc8d226190de786748aef456a219e72f99e5160e166e56ecf0f0c1c58cc92e5901c20a82428b663642659c1eeece2a21b5d7415f98d0e426caab7c0998d6b462cf511a30a75088191a507339feef800d5897cd998d7ac1e3c3b95dab4e6ff56db88c48832e7139fdded96e58b5cf8ecca197d109d6ec3e83f38afe090d462ccf34b1ae55c4142ca024d41f762952384640a41ef3dacd42339b36afc63b1c524f5285b0709904648e160f7065efe936bc4810b204dcc1067d9182f4ac16b9db697769254f4d730e5d4205c24fd930a95a157c85455eb20ab1316d1ec172dadecce54e58fe3e34c0eec16375e9c64b4b8180079db3d4e9f5fa2feade4680dff832a26ae3428aab59a553c360fa3dd348fa9983a5166036aed2189c1707d8478cbadaca10e350f235f952ca34467742d7da7ddf60d7e2d1de0fd46f80262e1d6d48350633b2310bdb83e3331863e46612e9641a0e15dc581cf78a8f8884e33b5a443f5ea0963bb09673f826a549af7472ab54936cff66ba1a2f9430445f80ab71ed24fa5a2940ad6ade56ef89160cf430902df83b1a3c93918fea5f7b56074a0b68fc041227642fb2b19c562c66e4b0bc1ad438d15a390f34d32acaf7a1a0adc2e42c6a63a04a972b3c7257528e98e6011a858b7495465d3c", 0x1000}, {&(0x7f0000001240)="4308134e54f77c4028979b0788265228b454bcd8167cc72ebaac467d40c83ac32d051577dd07c967704865e4cfe91c90194c83007501e5d33dc78dace478fc1c57438c797b53aa6e398b0d34bb3c18c0e474d92d2bafba30f451ee5ddb6c21946d4ef14915c9d84620def17c79c0a8b162b598007dad0a15ce9f3cdb46d7fa0d994d91cbcbef76867b9ff355c064a67fe52a9eca6bf32a556cb6", 0x9a}, {&(0x7f0000001300)="8763b9ec3113dece736d5e16ae8accf15d95314e322eabcd27c46659f3fa24d33489d3f922ecc15600e14728e36bc4acabe05e987945875864ffca9d9fa12612756afa027ad5da1e74a61cbbffcc720c12ac9923ad702f79647bfd73398d891b1ec6706160d4c5b535cc33e138a972fe6159f6116c5b4b94949b9a330365dd3a235d01efef700f286801779f53b0ab0c56d7aa281dee4c3326187b6c4d", 0x9d}, {&(0x7f00000013c0)="606c103d30065e69ec6b0a228b3a9b09267dbf6b317435d391cf30b3983d17e6eca93782564eb8fa11fd122f3286ae4c9dcf967d349a3dcb96d176f9f5c7e776a9aa87f8e39590322017ee58594a95809a9a5a07d721dac565731c9cdbd5a228d8", 0x61}, {&(0x7f0000001440)="bd722a8446bd3a39bca83a8bf05298006374eab84b53ce36f87f69dcc5cc15577d4f9cf4022ef8188afed6a8b668a236dd88ffaaba1aef5d053c87bc363a68e37bb5a0cc97c29f60d95038990b9b0f43b1ef47857208121b22bae6a2a142f1f8a458e21c9d5ed627b4e7f867710d50876d540555e32e084e1dcb3b02e9c0d44c18b766b39098", 0x86}, {&(0x7f0000001500)="33178ed6798967d3a02c29fca0d3d2d863e47e3621cf4cc9cab13160917b1cb7e535a8d4b8be9fd6160879ee77df9f69e97720e0c1c1c87e7fc82c50d2f8c84f9fc53e38155e8b3f2e6534c13fb7be76b0c6768660fd9c93ac784594fe41bf5fda97d19339c4d47be40a9218f355b5e5052f0e7db7f29d94509d2d6fd4aca7a91090de4199e5325feb9dd93e76b18c271983a6ac84c0e7f2", 0x98}, {&(0x7f00000015c0)="919174ac2774f92985772fcaef7ecd49ff18fc98546545ada2c401f0c7a854ee2141958e515bfcec63b6209281462093f7ed2e55666bedc0fdc48740568fbdbbf3d11ec1a6eeab4437d29123274f260ae104b8c921d9ba2df1440673732fab05362b57ebbae277e6e247584e92a00fcab25a364d64be468cf9d17b033daebea1d0195cd39e4b70f62bcf447cbdf84415ad5d04b5aa4000546f44191e739bcc3d4522591849dce7d87ad6d22d24ca135cc8eb05fb", 0xb4}], 0x9, 0x0) 15:50:56 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) r0 = semget(0x2, 0x3, 0x0) semop(r0, &(0x7f0000000000)=[{0x1, 0xe54, 0x1800}, {0x4, 0x8, 0x1800}, {0x1, 0x7, 0xdc8d11760e3b5862}, {0x0, 0x7, 0x800}, {0x0, 0xffff, 0x1800}], 0x5) 15:50:56 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(r2, &(0x7f0000000340)='./file0/file0\x00', 0x2, 0x82) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:50:56 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00') r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x0, 0x2) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0x9, 0x4) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000200)={0x4, 0x1, 0x20}) syz_mount_image$minix(&(0x7f0000000100)='minix\x00', &(0x7f0000000140)='./file1\x00', 0x6, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000180)="d56521764301f4812f792085078b69740feb", 0x12, 0x100}], 0x2000, 0x0) 15:50:56 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) semop(0x0, &(0x7f0000000100), 0x2d) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x196) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000100)={0x3, 0x16, 0x3, 0x4, "1a4c6df48e95cad3379daedb67e6bf56d77d7a42dd4384999f3cb813b8d393ce"}) semget(0x0, 0x0, 0x613) r1 = semget(0x2, 0x0, 0x200) semctl$IPC_RMID(r1, 0x0, 0x10) 15:50:56 executing program 0: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) waitid(0x800000000000004, r0, &(0x7f0000000100), 0x40000008, &(0x7f0000000180)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x80, 0x0) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000240)={[0x1, 0x100000, 0x13000], 0x7, 0x15, 0x8}) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0xfffffffffffffffc, @ipv4={[], [], @local}}, 0x1c) 15:50:56 executing program 5: semget$private(0x0, 0x4, 0x0) r0 = semget$private(0x0, 0x0, 0x41) semctl$SETALL(r0, 0x0, 0x11, &(0x7f00000001c0)=[0xbd, 0xffffffff9e64d4ce, 0x54]) r1 = semget(0x1, 0x3, 0x0) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1000000000000, 0x200) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000000080)=0x7) ioctl$KDMKTONE(r2, 0x4b30, 0x80000000) accept4$netrom(r2, &(0x7f00000000c0)={{0x3, @rose}, [@remote, @netrom, @remote, @remote, @netrom, @rose, @default, @rose]}, &(0x7f0000000140)=0x48, 0x80800) semop(r1, &(0x7f0000000040)=[{0x0, 0x5, 0x1000}, {0x2, 0x4}, {0x1, 0xffffffffffffff8a, 0x800}, {0x4, 0x97e2, 0x800}], 0x2aaaab93) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:56 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x7}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:56 executing program 4: r0 = socket$bt_cmtp(0x1f, 0x3, 0x5) fsetxattr$security_evm(r0, &(0x7f00000000c0)='security.evm\x00', &(0x7f00000022c0)=@v2={0x5, 0x3, 0x9, 0x8e2, 0x1000, "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"}, 0x100a, 0x3) syz_read_part_table(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0xfffffffffffffff7, {0x4, 0x5, 0x2, 0x8, 0x1, 0x2}}) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:50:56 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x588c, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) pselect6(0x40, &(0x7f0000000380)={0x2, 0x4, 0xcfaa, 0x9, 0x1, 0x3, 0x9, 0x7}, &(0x7f00000003c0)={0x0, 0x6, 0x6, 0x5, 0x140000000000, 0x200, 0x2, 0x3}, &(0x7f0000000400)={0x1, 0x10000, 0x0, 0xfffffffffffffff8, 0x0, 0x4, 0x315, 0x6}, &(0x7f0000000440)={0x77359400}, &(0x7f00000004c0)={&(0x7f0000000480)={0xff}, 0x8}) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) [ 1759.816418][T16716] Unknown ioctl 1082175138 [ 1759.847585][T16720] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:57 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semget$private(0x0, 0x1, 0x200) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="420000000600000000000000000000000400000000000000010000000000000019000000000000006367726f757076626f786e6574302d766d6e657431656d315d0019a4cc73190b43a9d8b0817722680cf30ca2bc015b930adcd454398cf120cbc15f554090abf08180a1f8da4199add16181f8eff408484841d2cd10"], 0x42) semop(0x0, &(0x7f0000000100), 0x2d) socket$inet6_tcp(0xa, 0x1, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000040)=0x1) 15:50:57 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x420000, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f0000000080)={0x8001005, 0x80000001, 0x3}) 15:50:57 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x6, 0x4300) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000000), &(0x7f00000001c0)=0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) fsync(r0) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:57 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x800, 0x0) ioctl$CAPI_GET_MANUFACTURER(r0, 0xc0044306, &(0x7f0000000040)=0x134c38e8) syz_read_part_table(0x7, 0xffffffffffffff61, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:50:57 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)=[0x5, 0x7fff, 0x5, 0x2, 0xffffffffffffffff]) r0 = semget(0x2, 0x7, 0x88) semctl$IPC_RMID(r0, 0x0, 0x10) 15:50:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000000c0)={0x9, 0xc, 0x81, 'queue0\x00', 0x9}) r2 = semget(0x2, 0x6, 0x400) semctl$IPC_RMID(r2, 0x0, 0x10) 15:50:57 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@ipv4={[], [], @local}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000240)=0xe8) mount$9p_rdma(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x40, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=rdma,port=0x000000che,timeout=0x00000P00000001ff,rq=0x0000000000000007,sq=0x000000007fffffff,noextend,timeout=0x0000000000000004,rq=0x0000000000000003,rq=0x0000000000000007,euid>\x00'/199, @ANYRESDEC=r0, @ANYBLOB="2c6f626a5f750e728fe7ac439121eb0d9119120e5e7365723dc9707070302c00"]) open(&(0x7f0000000380)='./file0\x00', 0x200, 0x0) syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:50:57 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) socket$inet6(0xa, 0x807, 0x200) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:57 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x8, @mcast2, 0x7b}, 0x1c) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000240), &(0x7f0000000280)=0xc) openat$md(0xffffffffffffff9c, &(0x7f0000000200)='/dev/md0\x00', 0x448001, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000300)={0x8, 0xffff, 0xf41, 0x5}, 0x10) semop(0x0, &(0x7f0000000100), 0x2d) r1 = semget$private(0x0, 0x4, 0x2) semctl$SETALL(r1, 0x0, 0x11, &(0x7f00000002c0)=[0x4, 0x9621]) r2 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000180), &(0x7f00000001c0)=0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f0000000040)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000380)) semctl$IPC_RMID(0x0, 0x0, 0x10) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000340)=[0x1, 0x7, 0x20, 0x1]) 15:50:57 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0xa}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) listxattr(&(0x7f0000000000)='\x00', &(0x7f00000000c0)=""/175, 0xaf) semop(0x0, &(0x7f0000000100), 0x2d) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$BLKRRPART(r1, 0x125f, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) [ 1760.572791][T17243] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:57 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) setxattr$trusted_overlay_origin(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000440)='y\x00', 0x2, 0x3) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) r2 = dup3(r0, r1, 0x7fffc) getsockname$llc(r2, &(0x7f0000000340)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000380)=0x10) 15:50:57 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000000)=[{0x0, 0xfffffffffffffffe, 0x1800}, {0x3, 0x800, 0x1800}, {0x1, 0x7ff, 0x800}], 0x3) semctl$IPC_RMID(0x0, 0x0, 0x10) r0 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x9, 0x100) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000100)) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000040)=0x7fff, 0x4) 15:50:57 executing program 4: r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000040)=0x10, 0x800) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000080)={0x0, 0x3}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)=ANY=[@ANYRES32=r1, @ANYBLOB="01007d004b3a83a9e9d0ab00009ea66ecb83195b443fb6147a019ca69140148d19b211d57bcc2f1fd2a736b1f06f241b218f2550f3fcb876dc3eaced0175de674163ac6b75affa302349416e754cd51cee055f6f7b5873f29b090000006a05e9a18a13c7bf9454bfd400d5ca422f9d04bbf1e843812853ae00000500e5ff000000cbfeda"], 0x85) syz_read_part_table(0x0, 0x2ec, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:50:57 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x80000, 0x0) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000080)) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100000890e, &(0x7f0000000000)="b3d9b78bc6012e7600000000000000") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) rt_sigprocmask(0x1, &(0x7f0000000040)={0x8}, &(0x7f00000000c0), 0x8) semop(0x0, &(0x7f0000000100), 0x2d) semget(0x0, 0x3, 0x8a) semget$private(0x0, 0x7, 0xc) semget$private(0x0, 0x4, 0x8) semget(0x0, 0x4, 0x11a) r1 = semget(0x2, 0x3, 0x0) semctl$IPC_RMID(r1, 0x0, 0x10) 15:50:57 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x191080, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x76, 0x20000) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000040)='\x00', &(0x7f0000000080)='./file0\x00', r1) 15:50:57 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0xfffbfffffffffffc, 0x0) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000040)=0xffff, 0x2) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:58 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 15:50:58 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) r0 = socket$rds(0x15, 0x5, 0x0) pread64(r0, &(0x7f00000000c0)=""/246, 0xf6, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:58 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0xc}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008910, &(0x7f0000000000)="7ec00003000000000095d1657b270d00") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r1 = semget$private(0x0, 0x4, 0x0) semop(r1, &(0x7f00000000c0)=[{0x1, 0x9, 0x800}, {0x3, 0x8001, 0x1800}], 0x2) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x7fffffff, 0x101200) fsmount(r2, 0x1, 0x78) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:58 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) r1 = syz_open_dev$radio(&(0x7f0000000340)='/dev/radio#\x00', 0x0, 0x2) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000380)={0x0, 0xf0, "445e6ede526c83045107eb227120e3507d3d5e5f3edf0529bc94db10c1d2be17b9e5ec1c35738d58596ececa2a3e53ce24f92dbce6ac1acf37db16e5051bc337783e625e2cfc43d068a242cd1d8ddd674d3b9d05c9371876fea698bd27d37db3f3749b385d594e0fcb5cb26aba1a0f6eec26e5d6ce628cbb53b668a30f9c01d9a9c5e95f96c26c44224a5a7c212d5dd8d195caa816e70832413acb37c3f3efa9d41569fd8e00aae690c0fa6b29984b2284e95f08fbbf21e27be9171f05c99916fe9b84f920b1b6cc1f3a05ae870597ce04109e46f93b7989afa0d7a0118512ce9f48f19ab24e2c675f83f223a7a4a2f3"}, &(0x7f0000000480)=0xf8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000500)={r2, 0x6c, "6eca0c045f37630c9ff7a6a531d0af715686814186a4a0be2dd2f17cb84eca27700fae60accf4fa46da799a097dceffabaa0fbc83af8a6b8e42fc02aebd9e4efabe3c21c44a075e9f2bb644dba2936fc2f0bd79a53d6022f66d603f61acceb7f2e9141d08c7636b82b453d68"}, &(0x7f0000000580)=0x74) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r3 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r3, 0x7fffc) 15:50:58 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000200)='./file0\x00') r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2000, 0x100) getsockopt$packet_buf(r0, 0x107, 0x1f, &(0x7f0000000040)=""/109, &(0x7f00000000c0)=0x6d) 15:50:58 executing program 0: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000080)='/dev/udmabuf\x00', 0x2) r1 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x2a, 0x101000) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000140)={r1, 0x0, 0x1000000000000, 0xfffffffff0000000}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) ioctl$UI_DEV_DESTROY(r2, 0x5502) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r3, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) [ 1761.259788][T17609] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:58 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r0 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x8001, 0x80000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x4e22, 0x100000000, @ipv4={[], [], @local}, 0x20}}, 0x100000001, 0x6, 0x135382af, 0xe6, 0xffffffff}, &(0x7f0000000480)=0x98) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r1}, &(0x7f0000000500)=0x8) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x55}}, &(0x7f0000000180)='GPL\x00'}, 0x48) semop(0x0, &(0x7f0000000100), 0x2d) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x810, r0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$IOC_PR_CLEAR(r4, 0x401070cd, &(0x7f0000000340)={0xfffffffffffffe00}) write$UHID_CREATE(r3, &(0x7f0000000200)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000100)=""/254, 0xfe, 0x5, 0x0, 0x800080000, 0x8, 0x1000}, 0x120) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000540)={0x6, 0x79a, 0x2, 0x100000001}, 0x8) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2000, 0x0) ioctl$TUNSETVNETLE(r5, 0x400454dc, &(0x7f0000000040)=0x1) 15:50:58 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x4000, 0x0) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f00000000c0)=0x5dc6b151) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000000)=0x7) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x7ffffdff, &(0x7f0000000180)="11dca5055e0bcfec7be07042987cce1bfb9194c1eccee126c29c9735ba58715df8bb686806bc12100e000034fd5503068d54d61bf690cbeddae84c2aec75e46976eeba575b4a12dfa5aeb440f987c239c18847cb4b00"/95) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000040)) getsockname(r0, &(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000240)=0x80) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semget(0x0, 0x0, 0x0) semget(0x0, 0x0, 0x80) r2 = semget$private(0x0, 0x7, 0x1) semctl$IPC_RMID(r2, 0x0, 0x10) 15:50:58 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2aaaab7f) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200200, 0x0) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x68b9f041fc6858b8, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000040)=0x7) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = semget(0x1, 0x4, 0x603) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000080)=[0x8000000000200]) semop(r1, &(0x7f0000000000)=[{0x3, 0x33dd, 0x800}, {0x6, 0x7fffffff, 0x1000}, {0x0, 0x31a5f076, 0x800}, {0x0, 0x80000000, 0x800}, {0x0, 0x5, 0x1000}, {0x3, 0x6, 0x800}, {0x3, 0x100000000, 0x800}, {0x4000003, 0x0, 0x1800}], 0x2aaaaaaaaaaaad3b) semctl$IPC_RMID(0x0, 0x0, 0x10) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x800, 0x0) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000002c0)=ANY=[@ANYBLOB="040000000000000002d000"/24, @ANYPTR=&(0x7f0000000140)=ANY=[], @ANYBLOB="00001a0000006127b257c3441a2f760000846d1614a0f7f2", @ANYPTR=&(0x7f0000000180)=ANY=[@ANYBLOB='\x00'/55], @ANYBLOB="000000000000000000f00000000000009300000000000000", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/147], @ANYBLOB="000000000000000000d01000000000000500000000000000", @ANYPTR=&(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) r3 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x1, 0x2) lseek(r0, 0x0, 0x800000000000006) ioctl$UI_SET_FFBIT(r3, 0x4004556b, 0x6d) 15:50:58 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x40, 0x0) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000100)=0x993) connect$inet6(r0, &(0x7f0000000080)={0xa, 0xfffffffffffffffd, 0x100000000, @ipv4={[], [], @local}}, 0xc) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:50:58 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000340)=0x44, 0x4) dup3(r0, r1, 0x7fffc) 15:50:58 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) r0 = accept4$ax25(0xffffffffffffff9c, 0x0, &(0x7f0000000000), 0x800) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x8, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:50:59 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0xe}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:50:59 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x5, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="2ab2144ff6cf419607653f3f9ebe7e4dd946d1b9879b0211127ae8b89bc3d51c0c3cbddc744ada854e9a9a4bbd4eed70dbf4b64e297a6b4886e50a7d33fdf4cb14a57246f259bcd525a1fb51b96980f1ebe1ac0df3e7ccac92", 0x59, 0x6d11}], 0x4000, &(0x7f0000000180)=ANY=[@ANYBLOB="736b69705f62616c616e63652c6d657461646174615f726174696f3d3078303030303030303030303030303030352c6e6f61636c2c61636c2c636865636b5f696e745f7072696e745f6d61736b3d3078303030303030303030303030303030312c6d657461646174615f726174696f3d3078303030303030303030303030303030322c6e6f646973636172642c747265656c6f672c64656772616465642c6673636f6e746578743d757365725f752c6f626a5f747970653d2c6673757569643d76003361367f37322d353075322d3f00666102000034382d006161617b32653d2c00"]) 15:50:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @dev}, &(0x7f00000000c0)=0x8) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x800, 0x2000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000140)) 15:50:59 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0xc0000, 0x0) getsockopt$inet_buf(r1, 0x0, 0x0, &(0x7f0000000100)=""/4096, &(0x7f0000000040)=0x1000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000001100)) fstatfs(r2, &(0x7f0000001140)=""/115) openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x10000, 0x0) 15:50:59 executing program 5: semget(0x2, 0x4000, 0x440) r0 = semget$private(0x0, 0x7, 0x40) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:59 executing program 4: syz_read_part_table(0x0, 0x360, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') [ 1762.155910][T18076] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:59 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:59 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 15:50:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100000890f, &(0x7f00000000c0)="05f242afcdcbc8c3dcd2cd3c00") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x4) semop(0x0, &(0x7f0000000100), 0x2d) semget(0x3, 0x3, 0x211) r1 = semget$private(0x0, 0x0, 0xe1) semctl$IPC_RMID(r1, 0x0, 0x10) 15:50:59 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000380)={0x2, [0x0, 0x0]}, &(0x7f00000003c0)=0xc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000400)={r2, @in6={{0xa, 0x4e21, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6}}, 0x0, 0xfffffffffffffffb, 0x0, 0xd4d, 0x5}, &(0x7f0000000500)=0x98) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) ioperm(0x80000001, 0x6, 0xfffffffffffff190) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, &(0x7f0000000540)=0x1, 0x4) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r3 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r3, 0x7fffc) 15:50:59 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000040)=[0xfe, 0x1]) syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:50:59 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040), &(0x7f00000000c0)=0x8) 15:50:59 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0xf}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") [ 1762.568979][T18206] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 15:50:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) setsockopt$inet6_buf(r1, 0x29, 0xd2, &(0x7f00000000c0)="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", 0x1000) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000000)=0x6, &(0x7f00000010c0)=0x4) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:59 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x240000000003d, &(0x7f0000000080), &(0x7f0000000040)=0x4) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x7, 0x601) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x1f, 0x9, [0xffffffffffff8f8b, 0x81, 0x9b, 0x883, 0x6, 0x5, 0x1ff, 0x9, 0x80]}, &(0x7f0000000140)=0x1a) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000180)={0x1, 0x8000, 0x8, 0x200, r2}, 0x10) 15:50:59 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0xc000, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000040)={0x19, 0x7, 0x2, {{0xc, '-vboxnet1:lo'}}}, 0x19) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:50:59 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) ioctl$KVM_ARM_SET_DEVICE_ADDR(r0, 0x4010aeab, &(0x7f0000000040)={0x10001, 0x2}) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0xd39}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={r1, @in6={{0xa, 0x4e21, 0xfff, @ipv4={[], [], @rand_addr=0x861d}, 0x6}}, 0x9, 0x2, 0xc9a0, 0x9, 0x1}, &(0x7f0000000240)=0x98) renameat(r0, &(0x7f0000000280)='./file0\x00', r0, &(0x7f00000002c0)='./file0\x00') syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:51:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x7, &(0x7f0000000180)="f8c2fca4cf81e42fc7ee5c849a470ecba7") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x5, 0x20000) r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x6, 0x1) r3 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x7, 0x1) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x280000, 0x0) r5 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x1, 0x2) ioctl$UDMABUF_CREATE_LIST(r1, 0x40087543, &(0x7f00000001c0)={0x1, 0x5, [{r2}, {r3, 0x0, 0x10000, 0xe89629564b78ddcb}, {r0, 0x0, 0x1000, 0x8000}, {r4, 0x0, 0x4000, 0xa000}, {r5, 0x0, 0x10000}]}) 15:51:00 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)) semop(0x0, &(0x7f0000000100), 0x2d) semget(0x1, 0x3, 0x100000000004) semget$private(0x0, 0x4, 0xa0) r0 = semget(0x0, 0x3, 0x1) semctl$IPC_RMID(r0, 0x0, 0x10) 15:51:00 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x8000, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) connect$bt_sco(r1, &(0x7f00000003c0)={0x1f, {0x3, 0x6, 0x6f20, 0x101, 0x9, 0x5}}, 0x8) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000340)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r2, 0x7fffc) 15:51:00 executing program 0: 15:51:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) r1 = semget(0x3, 0x1, 0x122) semctl$IPC_RMID(r1, 0x0, 0x10) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') write$binfmt_misc(r2, &(0x7f0000000200)={'syz0', "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"}, 0x1004) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x44000010}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r3, 0x304, 0x70bd2d, 0x25dfdbff, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x5}, 0x4804) 15:51:00 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x10}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:00 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:51:00 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000000040), &(0x7f00000000c0)=0xfffffffffffffdbd) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x8200, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000100), &(0x7f0000000140)=0x4) 15:51:00 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) r0 = getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="ae8e72fd2583ab69f420348851e6044ff95cdaaa1aeb73b621a22a08005ce9e9aa33da709c67436ac2fff263d0a307f1a4e7156df676127b093675f82c6c0c82dd3266930d4c4e865677e5128b111fa09be7ad4bc8bf9e62128602dc2191d9344a8fd93d2f6dd793764c9fc7467139374c911ae2cb51ae27eb1340fbecb9d5d42c61985f7551aac56fe3490d381f8462ae2f1b0f87264fa6cae9cd6650ca649151e0072df041b6290a2b6ea7865aed2d9b1041d75a6dd03bd8ec84e8a5e886f50a378e069e76a1cc3d33ef47babd4ad980ba1f82fc2e17d7e2f8795ece519ed1922e178a3737262e5ce912c9693c", 0xee, 0xa1e}], 0x8, &(0x7f0000000340)={[{@gid={'gid', 0x3d, r0}}], [{@smackfshat={'smackfshat'}}, {@appraise_type='appraise_type=imasig'}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@uid_gt={'uid>', r1}}, {@smackfshat={'smackfshat', 0x3d, '+!self'}}, {@smackfsroot={'smackfsroot'}}]}) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x60) 15:51:00 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f00000000c0)={{0xffffffffffffffff, 0x2, 0xa231, 0x2, 0xfffffffffffffff7}, 0x400, 0x4}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x80000, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) 15:51:00 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x48}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:00 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000080)) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x40, @local, 0xfffffffffffffffd}, 0xfffffffffffffefa) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) setsockopt(r0, 0x57c, 0x821c, &(0x7f0000000040), 0x0) 15:51:00 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) link(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000380)='./file0/file0\x00') mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:51:00 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x4c}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:00 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x9, 0x4000) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000100)=@ccm_128={{0x307}, "83278c076a88c2ad", "abe4736995cecd529b1e8c0fdf09ee12", "c3430b6e", "b254eebc28439c00"}, 0x28) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x800, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:51:00 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0xffff, 0x4, &(0x7f00000012c0)=[{&(0x7f0000000080)="6d98c583398b83d4b6cbb37948831e5a5a4f3b298103e814ce0dbfc3ddd1adfd9ce8350361515d098ed937e17ad0b96325eb7f170bfb8967ba5604e88af85f0dd3b9ebe96306455682312ed78ca167e869193733bd8b830589f2490b3adc02f533bb4bedf45a4b268d426adfd76dcef1f6afa833a1d84c8d19d741bc97643809fba8bfa47f21e9692461e5a1246cf1762364c33e2650686a47d861f1af54a137c5f23d8ae0bab5516307989f8f9c9adf5129964ee7abaa3ad538719209f3ada7b97c4677495c6c", 0xc7}, {&(0x7f0000000180)="c3d45c30801ef56ceb52f24538b90c4f472a652f1fe549e5ea2f08860f3f2871ef4d3e3dbd05bafd381f0793741e909a52e705cb036236", 0x37, 0x6}, {&(0x7f0000000240)="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", 0x1000, 0x2}, {&(0x7f0000001240)="579a587996887c8e86084a4feacd39c6fdfc16bfea8a922f5b34082ef084a2be40ded12d2634286abcb6bacd189f906dbfcc6f146a30dfda5f5675176c7769c8fc174a98620f7ccd26ea04b6fff05f68ec34db2d37b2344f25", 0x59, 0x58}], 0x4001, &(0x7f0000001340)={[{@dots='dots'}, {@fat=@check_normal='check=normal'}, {@fat=@errors_continue='errors=continue'}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x7f, 0x37, 0x31, 0x62, 0x77, 0x3b, 0x39], 0x2d, [0x0, 0x38, 0x74, 0x76], 0x2d, [0x39, 0x0, 0x39, 0x77], 0x2d, [0x39, 0x63, 0x34], 0x2d, [0x0, 0x0, 0x37, 0x35, 0x75, 0x7b, 0x35, 0x37]}}}]}) 15:51:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000016ff0)={&(0x7f0000000180)={0x1c, 0x55, 0x3ef, 0x0, 0x0, {0x7}, [@typed={0x8, 0x88, @uid}]}, 0x1c}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r2 = semget$private(0x0, 0x4, 0x41c) semop(r2, &(0x7f0000000000), 0x1d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:51:01 executing program 5: semget(0x1, 0x7, 0x80003) semget$private(0x0, 0x7, 0x40) r0 = semget(0x1, 0x4, 0x2) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000140)=[0x6, 0x7]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) r1 = semget$private(0x0, 0x0, 0x80) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000000)=[0x4, 0x1ff, 0x3, 0x0, 0x1a, 0x6, 0x200, 0xd428]) 15:51:01 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x60}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:01 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x400008, &(0x7f0000000040), &(0x7f00000000c0)=0xfffffffffffffef5) 15:51:01 executing program 4: open$dir(&(0x7f0000000000)='./file0\x00', 0x10000, 0x2) syz_read_part_table(0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x78ee, 0x40002) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000080)) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:51:01 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) mount$9p_rdma(&(0x7f0000000340)='127.0.0.1\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000700)={'trans=rdma,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@sq={'sq', 0x3d, 0x7}}], [{@subj_role={'subj_role'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, 'ppp0-'}}, {@fowner_gt={'fowner>', r1}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@smackfsdef={'smackfsdef', 0x3d, 'trusted.overlay.nlink\x00'}}]}}) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r3 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r3, 0x7fffc) 15:51:01 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) r0 = getuid() lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000140)={{{@in=@multicast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}}}, &(0x7f0000000040)=0xe8) setresuid(r0, r1, r2) [ 1764.187680][T19123] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 15:51:01 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x68}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") [ 1764.231383][T19123] PF_BRIDGE: br_mdb_parse() with unknown ifindex [ 1764.280335][T19123] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 15:51:01 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000000040), &(0x7f00000000c0)=0x238) 15:51:01 executing program 4: r0 = socket$bt_rfcomm(0x1f, 0x0, 0x3) syz_read_part_table(0x5, 0x8d, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='./file0\x00') accept4(r0, &(0x7f00000000c0), &(0x7f0000000240)=0x80, 0x800) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='\xf7\xffqoc/sys/net/ip~4et\x00'/34, 0x2, 0x0) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000000380)={0xfffffffffffff800, 0x5}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'veth1_to_bond\x00', 0x0}) clock_gettime(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0}) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x1, 0x4) sendmsg$can_bcm(r1, &(0x7f0000000340)={&(0x7f0000000200)={0x1d, r2}, 0x10, &(0x7f0000000300)={&(0x7f0000000280)={0x6, 0x220, 0x3f, {0x0, 0x2710}, {r3, r4/1000+30000}, {0x4, 0x9, 0x3f, 0x590}, 0x1, @can={{0x4, 0x3, 0x3d7f, 0x3ff}, 0x5, 0xab127cd089a56c0d, 0x0, 0x0, "081d91b43e0de003"}}, 0x48}, 0x1, 0x0, 0x0, 0x12189d079f0c040b}, 0x4) ioctl$CAPI_NCCI_OPENCOUNT(r1, 0x80044326, &(0x7f0000000000)) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) [ 1764.366545][T19123] PF_BRIDGE: br_mdb_parse() with unknown ifindex 15:51:01 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3, 0x94000) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x0, 0x0, 0x2, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f00000000c0)={0x7ff, r1}) 15:51:01 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x6c}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfec7be0701d469df8ae6dad787bb0ffd254f2ad4dc5cef5be0a6a8cc57d55856b231f0012f9feb4fa5b9b5b73a1159d5a04abece3d1f48d6356960623d68a354f853f62") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x880, 0x0) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f00000000c0)={0x8}) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) setsockopt$inet_buf(r0, 0x0, 0x2b, &(0x7f0000000100)="d82f48b71a4af7975dd355dce70c3047a4c37e06a579ab3231c54ea33b9ad197ba5e3ac5a7a08a806bd090f08a8ff99094a9511a0e87289d0fae771a21fbe68cfc76aeb4cda8ab09231686e201a718d891a04455a39b6ec88ba85b19a7fd061a88dc5e332a853b0acb184442f9cfad412546745a2599b74145cc165c996bb5ace2291bbd285c82cd7f1cadd3d0025780bc76c3b2bb706829ab6c263571a591746497d5ecb3c7066f78da91ae51b4b7c6c938f0f9381b623307b119722d0130", 0xbf) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:51:01 executing program 4: syz_read_part_table(0x2, 0x1182b51625d9d6, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:51:01 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa0, 0xa0, 0x9, [@ptr={0x1, 0x0, 0x0, 0x2, 0x1}, @struct={0x9, 0x4, 0x0, 0x4, 0x1ff00, 0xe5b5, [{0x0, 0x0, 0xfffffffffffffff8}, {0xf, 0x1, 0x1}, {0x3}, {0xd, 0x2}]}, @fwd={0xd}, @typedef={0xe, 0x0, 0x0, 0x8, 0x4}, @const={0x1, 0x0, 0x0, 0xa, 0x4}, @volatile={0xd, 0x0, 0x0, 0x9, 0x1}, @var={0x4, 0x0, 0x0, 0xe, 0x5}, @restrict={0x1, 0x0, 0x0, 0xb, 0x4}, @fwd={0xb}]}, {0x0, [0x3e, 0x30, 0x6f, 0x2e, 0x0, 0x0, 0x2e]}}, &(0x7f0000000200)=""/224, 0xc1, 0xe0, 0x1}, 0x20) 15:51:01 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fff8) 15:51:01 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000140)=[{0x13, 0x10001, 0x800}], 0x279db868335de9fe) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:51:01 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x74}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:01 executing program 4: symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:51:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) r1 = semget(0x1, 0x4, 0x81) semctl$IPC_RMID(r1, 0x0, 0x0) 15:51:02 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x2, 0x70, 0x20000000, 0x3, 0x7, 0xb9c, 0x0, 0x8, 0x10000, 0x2, 0x9, 0x9, 0x6, 0x8, 0x1, 0x0, 0xfffffffffffffffc, 0x69, 0x81, 0x2f, 0x4, 0x7fffffff, 0x128, 0x1, 0x0, 0x0, 0x2, 0x3f, 0xffff, 0x9, 0x6, 0x1, 0x3, 0x2, 0x313, 0x6, 0x7, 0x7, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x80000000, 0x0, 0x7, 0x1, 0xcb, 0x20}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x4) write(r0, &(0x7f0000000140)="edda0ced5b098d9b3f3725c7b2c8a2aa4fa8629cf0f943cbfae7de266e6d663769c0b82f86e61609a4fc3493a391faf8746945127c1da73487bbfb25f245fcf296ee0dd9fcc9cabadeb3a73c50ccfc0dbaacaf1067d2738b936959d3e79fd7", 0x5f) getgroups(0x5, &(0x7f0000000040)=[0xffffffffffffffff, 0xee00, 0xee01, 0x0, 0xee01]) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x2, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r3, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, r4, 0x8, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1f}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6cbb}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x48001}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) setresgid(r1, r2, r5) sendmsg$IPVS_CMD_SET_SERVICE(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2024008}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x38, r4, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x400}]}, 0x38}}, 0x4044090) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:51:02 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'hsr0\x00', r1}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:51:02 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x7a}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:02 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semget(0x2, 0x7, 0x440) r0 = semget$private(0x0, 0x2, 0x27) semop(r0, &(0x7f0000000040)=[{0x3, 0xfffffffffffffffd, 0x1000}, {0x3, 0x9, 0x800}, {0x0, 0x1ff, 0x800}, {0x1, 0x2}, {0x3, 0x800, 0x1800}, {0x0, 0xffffffffffffff81, 0x1800}], 0x6) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:51:02 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) r0 = geteuid() r1 = geteuid() r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_sco(r2, &(0x7f0000000000)={0x1f, {0x100000001}}, 0x8) lstat(&(0x7f0000001400)='./file0\x00', &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x5, &(0x7f0000000140)=[{&(0x7f0000000080)="845d7a3e63e5c3c03cd870ecbc0e8d137082e552d385e5eef763c6a347dab276fb33344b7a257a6b4111c5cf048f341bae9df0e02eeba7d9aef9bd341a60590d8d9f69534e3d3cb7031f", 0x4a, 0x9}, {&(0x7f0000000240)="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", 0x1000, 0xce}, {&(0x7f0000000100)="1df0b9e3dffd477e33fcd7ec86471d48d7e258c277fb44", 0x17, 0x8}, {&(0x7f0000001240)="eda66475aae382c0a1239b982e370c29faa138c5c0bddb7a321a14444872a1c8cab0101ffbe30054aa379fd862d76bae6a4e25f7715153bdb38538df9cbeacb779807cafb456cc44e568bd8f6692db4cfcaa8bc234dea67c365f0e27cdfc51ca4ccba6e130634aa836b6d9eca467de9c41ed47b40dfb10c268e1ec29d9e0594717fc624527e8091af7ea31bf4d67ef9ec69af04d4862e854e8", 0x99, 0x2a14}, {&(0x7f0000001300)="fb37c1560c6db25e21f7d7a3ba07f95b96cc89ed11a1af2712cc01cb1f2a1f320efe452e1e327296a1b0a13e4ad7b9ec0d0d078591c87c9017960b2d67c09df9f27268a7559a0092c44c020905b424c8db0626ed3e49334a6409c2294d135b7f36c06b4a70b29e8001fe554e81027922ad5d47f2c0893c0b21793f8d0738aa01e047df3cb296de5c1c6a250e552b278d050c00b69b86a63ae2aa3ae74722cd7d2058aa5b5a4776b164d709ddceb55528037f925f926a4b0a56bad45f3352e034ed42ff12b16328e72f87", 0xca, 0xf7d0}], 0x1000, &(0x7f00000014c0)=ANY=[@ANYBLOB="686173683d72352c6a71666d743d7666736f6c642c6a71666d743d7666736f6c642c6772706a71756f74612c626172726965723d6e6f6e652c726573697a653d3078303030303030303030303030303030302c636f6e762c7573726a71756f74612c6e6f61747472732c7461696c733d6f66662c66736d616769633d3078666666666666666666666666663830312c736d61636b6673666c6f6f723d712c6673757569643d73313377303631342d326477612d327f3b772d627f387e2d39343964777f79622c7569643e", @ANYRESDEC=r0, @ANYBLOB=',Uootcontext=root,dont_hash,func=PATH_CHECKlappraise,fowner=', @ANYRESDEC=r1, @ANYBLOB=',fowner=', @ANYRESDEC=r3, @ANYBLOB=',\x00']) r4 = getpid() get_robust_list(r4, &(0x7f00000017c0)=&(0x7f0000001780)={&(0x7f0000001700), 0x0, &(0x7f0000001740)}, &(0x7f0000001800)=0x18) r5 = dup(r2) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000001880)=0xcb52) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000001840)='/dev/dlm-control\x00', 0x0, 0x0) write$P9_RREADDIR(r6, &(0x7f00000018c0)={0x2a, 0x29, 0x1, {0x2, [{{0x0, 0x4, 0x6}, 0x8, 0x1, 0x7, './file0'}]}}, 0x2a) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') r7 = syz_open_dev$radio(&(0x7f0000001680)='/dev/radio#\x00', 0x2, 0x2) ioctl$SG_GET_SCSI_ID(r7, 0x2276, &(0x7f00000016c0)) syz_read_part_table(0x1, 0x8, &(0x7f0000001d80)=[{&(0x7f0000001900)="2767e728e3db8d4a3bf7e697d248906819e688e9913f6b8b9e3be5aae3c5a197c0613d8904f2fafd55d85d5379ffbdbf3924f281f0eb07ab6df8e7d1056fc80b22c4db7ee0a591ec449fb3bca2b97e799e9bc224f9602dbd5b003f0132cd37e9661a3b63a539fb6830e628a67a84821b2ceac26eb1989099b29a26d02ac9069bb8a6f44ae38d117ba1f13d74ec6228ddc867bd48f3d4b8351354b8bad55db3ba8b0f3eabddbfe915d3d88a7627f8dec5135a62318fd3cb", 0xb7, 0x4}, {&(0x7f00000019c0)="390f7ed9510171736f131205466260cbda8df9d0bc2b76dfa1a5480bc8cc831a1a2f69ee4ac302eee086b8c049fab0d2ab2880922614b89959d8af5e492b2fa6c21d3ba574ca8b99b6500b6b6ec482ed1f635df3dcb3d1b1b2a1d5222124728e1edbc0f656058fce172ca4cf044fa2672fe3e17df18bbc975f651980fae4cb3e2d60dcb0620dbb452fea031637b27fbd046ba6489eb1570618acccb484bd04d78801f7c504b47c297f31e39b9993ef2b0e96289ad0ac5b296c26683c6d67dafeb185956d4da53db204a839a463e402578fad0b127845b0a844aa225ddd5c6dbfc6e1f5b27ad652", 0xe7, 0x7}, {&(0x7f0000001ac0)="aa4813681de5d8a9f0f0c6ccbee7f37c8ef81972cdadacc76f485178887e98c9d374b8b07c2da83898403b", 0x2b, 0x1540000000}, {&(0x7f0000001b00)="21d8fa37ed73a8c6f3a9a9760a0ebb48397e7922046a64fc80ddd4d4de8e73711307f5ad5468ee744c6d15a0711e52f214c6155be8b4a25c595ecb61a67c9ffa97f5398178e54a2c933972eefa1b39e5d592a2602b22fcbc46fbd8cc5f2fc7dadbc123c6e4b9dd43b3a2fd0a80ea1b8f33ce90b6376ebfcd271dd3c7752cd28d70828ce55153a4b34c57069540a1e880ae96f3e8b41d6cc8467c5891c2cef76524d4", 0xa2, 0x20}, {&(0x7f0000001bc0)="98beeaaa88ee3e91445d71a021756954cb62b272e79158eb4194884ad61a8015ec38657db8d673367fa20d985b6c5df9e1317a8259487ee3ec58f6b3e68e6e001114455d8f1b5e5fffe20413af4fc393da10715771778cc6a9bcdd67c5ad4245d16649019eea15", 0x67, 0xcd}, {&(0x7f0000001c40)="5c31951efaf316", 0x7, 0x2}, {&(0x7f0000001c80)="a7d5b39af2e8d6a2a3dbc15201e9a0a44d544eb0f0f8a4f48639846efab9e8beb92aa5efa04c5b250dd4db27c1f013f816538d1e630a84a8d88083e7e3e345b7f6cd84f5dfc1eeef935b7c9e9418266ee248bf28bc90905abe67460743d92e91aa0bf22ad220af4141333f862676c5d7bee524", 0x73}, {&(0x7f0000001d00)="0b1559ed7118e8e48775a34be9f0e06cfdba4041faab5b2594f99a9a0d96aa83c12e6087d8d4f526593608fa1098e85f03ed613dce941f579eee302a826c539db5b185a832ee5b88077859155205a3a84f13c033204d696db196a9b3ab35581163a71ba8", 0x64, 0x9}]) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f0000001640)={0xa, 0x4d238fc5059a0077, 0x3264f20b, 0x8, '\x00', 0x7}) 15:51:02 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) r2 = gettid() ptrace$pokeuser(0x6, r2, 0x1, 0x7) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) socket$packet(0x11, 0x3, 0x300) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:51:02 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0xc0}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:02 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)=[0x200]) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') semop(0x0, &(0x7f0000000100), 0x2d) openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x2200, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:51:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)=[0x2, 0x7f]) semop(0x0, &(0x7f0000000100), 0x2d) semget(0x1, 0x0, 0x20) semget(0x3, 0x4, 0x80000000000440) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) r1 = semget$private(0x0, 0x7, 0x40) semget$private(0x0, 0x1, 0x108) semctl$IPC_RMID(r1, 0x0, 0x10) 15:51:02 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0x3f, 0x0, 0x13, 0x3, 0xfe3}, 0xc) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:51:02 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0xf0}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:02 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semctl$IPC_RMID(0x0, 0x0, 0x10) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x5, 0x400000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000100)={0x6, 0x200, 0x202, 0xdbb, 0x20, 0x2, 0x10000, 0xffffffff, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000180)={r1, @in={{0x2, 0x4e22, @remote}}, 0x1, 0x5eb}, 0x90) openat$cgroup_int(r0, &(0x7f00000000c0)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9, 0x240) 15:51:02 executing program 4: syz_read_part_table(0x74, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:51:02 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x300}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:02 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x86) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.nlink\x00', &(0x7f00000003c0)={'L+', 0x1f}, 0xfffffffffffffcd0, 0x2) dup3(r0, r1, 0x7fffc) 15:51:02 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x40000000, @mcast1}, 0x65d) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @local}, @in6=@local, 0x4e20, 0x0, 0x4e20, 0x100, 0xa, 0x80, 0x0, 0xbb, r1, r2}, {0xffffffffffffe164, 0x10000, 0x3ff, 0xfffffffffffff800, 0x80000001, 0xfff, 0x5, 0x624}, {0x9, 0x6, 0x58a, 0x2}, 0x8, 0x6e6bbd, 0x0, 0x0, 0x2, 0x2}, {{@in6=@dev={0xfe, 0x80, [], 0x29}, 0x4d3, 0x3f}, 0xa, @in6=@rand_addr="5f860cd3ee288c7848429675489aad2d", 0x3505, 0x2, 0x3, 0x1eb2ca6, 0x7fff, 0x1, 0x2}}, 0xe8) 15:51:02 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r0 = shmget(0x2, 0x200000, 0x4, &(0x7f0000e00000/0x200000)=nil) shmctl$IPC_RMID(r0, 0x0) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1000, 0x10040) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000040), 0x4) 15:51:02 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x500}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:03 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semget(0x0, 0x7, 0x100) r0 = semget$private(0x0, 0x4, 0x84) semop(r0, &(0x7f0000000000)=[{0x0, 0x400, 0x1000}, {0x1, 0xfffffffffffffffd}, {0x4, 0x4, 0x8ed372125d65fb18}, {0x0, 0x2, 0x1800}, {0x2, 0x81a3}, {0x3, 0x2, 0x800}, {0x3, 0x0, 0x1000}], 0x2aaaac31) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:51:03 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x600}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) r1 = semget(0x1, 0xe81a561d6e9ff31c, 0x21775acfb56af65a) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8000, 0x0) getsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f00000000c0)=0x4, &(0x7f0000000100)=0x4) semctl$IPC_RMID(r1, 0x0, 0x10) 15:51:03 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x82, 0x0) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f00000000c0)) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2f7c, 0x0) sendto$x25(r1, &(0x7f0000000040)="f5bf366a01a0ef2567a0959e11ec2c3adb80826a78c20cff2d1da0dd8cc775faf6330fcc6842ab3fd0426e342044", 0x2e, 0x4010, 0x0, 0x0) 15:51:03 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x2, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) mount$9p_rdma(&(0x7f00000001c0)='127.0.0.1\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x440, &(0x7f0000000380)=ANY=[@ANYBLOB="7472616e612c706f72743d3078303030303030303030303030346532302c6163636573733d757365722c706f73697861636c2c7569643c0000000000c1bb", @ANYRESDEC=r1, @ANYBLOB=',\x00']) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x80000001, 0x101000) getsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000140)=""/62, &(0x7f0000000180)=0x3e) openat$cgroup(r2, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r2, 0x5386, &(0x7f0000000100)) 15:51:03 executing program 5: semget(0x2, 0x2, 0x100) r0 = semget$private(0x0, 0x7, 0x42) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000100)=""/85) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f0000000040)={0x400, 0x0, 0x500, 0x800, 0x7, 0x3f, 0x8}) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:51:03 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x80000000088000, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:51:03 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x700}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:03 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0xa00}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:03 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = gettid() fcntl$setown(r0, 0x8, r1) getsockname(r0, &(0x7f0000000080)=@ethernet={0x0, @random}, &(0x7f0000000100)=0x80) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9, 0x101000) ioctl$BLKBSZSET(r2, 0x40081271, &(0x7f0000000040)=0x2) 15:51:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2, &(0x7f0000000100)='p') semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x6, 0x20801) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000040)) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000240)="48ea25669228a32c7fdd") semctl$IPC_RMID(0x0, 0x0, 0x10) connect$ax25(r1, &(0x7f00000001c0)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x8}, [@default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @null]}, 0x48) r2 = semget$private(0x0, 0x0, 0x41) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) semtimedop(r2, &(0x7f00000000c0)=[{0x4, 0x6}, {0x3, 0xbf, 0x800}, {0x0, 0x81, 0x1800}, {0x3, 0x7, 0x800}, {0x1, 0x100000001, 0x800}], 0x5, &(0x7f0000000180)={r3, r4+30000000}) 15:51:03 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f0000000040)={0x0, 0x4, 0x1, [], &(0x7f0000000000)=0x2}) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 15:51:03 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0xc00}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:03 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x4000, 0x0) r2 = memfd_create(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20005) r4 = dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x80\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,Q\xf0\x1b\x7f\v\x01O\x9f\x91\xee\xb7\xc3|r@\xf4v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) write$sndseq(r2, &(0x7f000000a000)=[{0x7, 0x21, 0x0, 0x0, @time={0x77359400}, {}, {}, @ext={0x0, 0x0}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000140)={0x70573b3d8ef82cfb, @time={0x77359400}}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}}}, &(0x7f0000000240)=0x84) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000280)={r5, 0x8, 0xa965, 0xfff, 0x6a4e, 0xffff}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={r0}) getsockopt$X25_QBITINCL(r6, 0x106, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x4) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:51:03 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200000, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) write$sndseq(r0, &(0x7f0000000200)=[{0x0, 0xe7, 0x5, 0x9, @time={0x0, 0x989680}, {0x0, 0xffffffffffff8000}, {0x5, 0x9}, @raw8={"24537dd1a56015eab716aad2"}}, {0x47f, 0x1, 0x0, 0x5, @time={0x0, 0x1c9c380}, {0x3, 0x400}, {0x1ff, 0x5432}, @raw32={[0xffff, 0x8, 0xaf]}}, {0x4, 0x3a4800000000, 0x10001, 0x60b, @tick=0x4, {0x40, 0x7}, {0x0, 0x3f}, @ext={0x53, &(0x7f00000000c0)="21e50a6c06ceab82803c5850706b5be17c9c25189eb53917e54179832d9de344de962ab36ea5b5ef871708b2636fa92e95fb71ceef6a32c2a5fb4dde174d775c379cee123abe6d5e3f11d2e760125da51bb85b"}}, {0x1, 0x8000, 0xb2d5, 0x3ff, @tick=0x2, {0x8000, 0x40}, {0x8c, 0x8}, @raw32={[0x1ff, 0xa9f4, 0x3]}}, {0x100000000, 0x5, 0x80000000, 0x0, @tick=0x7, {0x2, 0x4}, {0x8, 0x40}, @quote={{0x9, 0x3}, 0x2}}, {0x20, 0x7, 0x7f, 0x7, @tick=0xd85, {0x6, 0x6}, {0x8b}, @ext={0xa1, &(0x7f0000000140)="5a83df5596291f3403c797b39722994fb80d33b2c0697aac80a03568fbbd6f8e82b2209af53ad924ee84e7eb68fae37c9b5bf4f2c056c2864fedb26339adf36dfc504fdd8d0cf04d75eb5fe06bf7eee00b99b8f3155d81db9a3d1deeada003cbec569956c6e31b4721f74f7ee63a21f914c05dfac2759c0d8854fcbc722a362839a2f9920e4d80d0004f6bcd715f65681caa54df10c08667fa9a9e6608330cd072"}}, {0x8, 0x7ff, 0x4, 0x6, @tick=0x10001, {0x6d46, 0x1f}, {0x9, 0x7fff}, @quote={{0xb54, 0xffffffffffffff44}, 0x3, &(0x7f0000000040)={0x81, 0x1, 0x0, 0xfffffffffffffff7, @time={0x0, 0x1c9c380}, {0x4e2, 0x2}, {0x101, 0x1}, @control={0x198, 0x2, 0xff}}}}], 0x150) 15:51:03 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/btrfs-control\x00', 0x0, 0x0) r2 = dup(r0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f0000000380)='trusted.overlay.nlink\x00', &(0x7f00000003c0)='./file0\x00', r2) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r3 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x1000000000083ffe, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r3, 0x7fffc) 15:51:03 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0xe00}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x3, 0xc6}) 15:51:04 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semctl$IPC_RMID(0x0, 0x0, 0x10) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x1) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000040), &(0x7f00000000c0)=0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000100)={0xbf6a, 0x2, 0x8006, 0x4, 0x7fff, 0xa7, 0x2, 0x1f, 0x0}, &(0x7f0000000140)=0x20) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e22, 0x0, @local, 0x5}}}, &(0x7f0000000240)=0x84) 15:51:04 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x2, 0x101000) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000080)) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:51:04 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0xec0}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000000), 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:51:04 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000040)={'security\x00'}, &(0x7f0000000100)=0x54) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:51:04 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r0 = semget$private(0x0, 0x3, 0x1) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7f, 0x80040) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x2, 0x441) ioctl$VHOST_SET_VRING_CALL(r1, 0x4008af21, &(0x7f00000000c0)={0x1, r2}) semop(r0, &(0x7f0000000000), 0x2fe) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:51:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$dmmidi(&(0x7f00000012c0)='/dev/dmmidi#\x00', 0x4, 0x612841) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000002580)=ANY=[@ANYBLOB="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"/4536], 0x1015, 0x1) r2 = semget$private(0x0, 0x6, 0x100) semctl$SETALL(r2, 0x0, 0x11, &(0x7f0000000080)) r3 = open(&(0x7f0000000000)='./file0\x00', 0x8000, 0x100) ioctl$SIOCX25SSUBSCRIP(r3, 0x89e1, &(0x7f00000000c0)={'bond_slave_0\x00', 0xfb, 0x8}) sendto$rxrpc(r1, &(0x7f0000000200)="cdcfe116afefe2808608f0aea3c35642802bd32691553a7368cc68355c7cd8f00e12fa6e7ffc52916fb81efd3effb986183d38d007cfcd4bf00ce51714fda997adb54a479816c3b77b579c9258a74ab59aa9ea4f7740530d964c043aba2f9250ede7b85e2a2f31c8b42a9fc655b2cf366a2cf3f9f5b920bacd8f7f7da4ffd798145f54617f30d3005635de57a2e55276784216d38f9b068dc6583afb71b7b910700993845582727b35df563954d5c200a20a1df345806cac8807fb6f7a0e009fe0de15fc9537593d0cf70b5dda9c1ee250a4c08f", 0xd4, 0x40, &(0x7f0000000300)=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e23, @remote}}, 0x24) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) bind$ax25(r3, &(0x7f0000001240)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x6}, [@null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x48) 15:51:04 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0xf00}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:04 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) r0 = shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x1000) shmdt(r0) 15:51:04 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vga_arbiter\x00', 0x127a82, 0x0) write$input_event(r0, &(0x7f0000000480)={{}, 0x15, 0xbf, 0x4}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, &(0x7f00000003c0)=0x6e) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000440)='/dev/video36\x00', 0x2, 0x0) ioctl(r1, 0x405, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r3 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r2, r3, 0x7fffc) 15:51:04 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') 15:51:04 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm-monitor\x00', 0x40402, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x113, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000340)={0x13, 0x10, 0xfa00, {&(0x7f0000000100), r2, 0x1}}, 0x18) getsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000500)=""/180, &(0x7f00000005c0)=0xb4) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_int(r3, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 15:51:04 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x199d}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r1 = dup2(r0, r0) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000000)={0x8, 0x0, 0x4, 0x1000, 0x2, 0x1}) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:51:04 executing program 5: semget$private(0x0, 0x2, 0x80) r0 = semget(0x0, 0x0, 0x2) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)=[0x7, 0x1c, 0x7, 0xcd, 0x0]) semop(0x0, &(0x7f0000000100), 0x2d) semget(0x0, 0x3, 0x1c) semctl$IPC_RMID(0x0, 0x0, 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000080)=0x40, 0x4) 15:51:04 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, @in6={0xa, 0x4e24, 0x400, @mcast2, 0x1}, @in6={0xa, 0x4e24, 0x4, @rand_addr="83f7bbf4fd11ce314d8bd045fd52d27e", 0x81}, @in6={0xa, 0x4e22, 0x1, @mcast2, 0x2000000}], 0x64) syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:51:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x6, &(0x7f0000000180)="11dca5055e0bcfdf19e070") semget(0x2, 0x3, 0x42) semget$private(0x0, 0x0, 0x40) semget(0x1, 0x2, 0x8) r1 = semget(0x0, 0x5, 0x88) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x82) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f0000000040)={0xa00000000000000, 0x104000, 0x0, 0x4, 0x18}) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {0x0}, {}, {}]}) ioctl$DRM_IOCTL_UNLOCK(r2, 0x4008642b, &(0x7f0000000140)={r3, 0x18}) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:51:05 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x2000}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x2, 0x0) 15:51:05 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3, 0x1) accept4$unix(r0, &(0x7f00000000c0)=@abs, &(0x7f0000000040)=0x6e, 0x800) semop(0x0, &(0x7f0000000100), 0x2d) r1 = semget$private(0x0, 0x4, 0x21) semctl$IPC_RMID(r1, 0x0, 0x10) 15:51:05 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x3f00}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:05 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000340)='security.selinux\x00', &(0x7f0000000380)='system_u:object_r:xserver_misc_device_t:s0\x00', 0x2b, 0x1) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:51:05 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000340)={'ip6gretap0\x00'}) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x0, 0x8000, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(0xffffffffffffffff, r0, 0x7fffc) 15:51:05 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) r1 = fcntl$getown(r0, 0x9) rt_sigqueueinfo(r1, 0x22, &(0x7f0000000000)={0xe, 0x6, 0xfff}) 15:51:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_netfilter(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 15:51:05 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x4000}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:05 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='./file0\x00') 15:51:05 executing program 3: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000240), 0x1ffffff8) getsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, &(0x7f0000000040)) 15:51:05 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000340)={'ip6gretap0\x00'}) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x100000001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:51:05 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x4800}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:05 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) syz_mount_image$f2fs(&(0x7f0000000340)='f2fs\x00', &(0x7f0000000380)='./file0/file0\x00', 0xffffffffffffb7f7, 0xa, &(0x7f0000000a80)=[{&(0x7f00000003c0)="84f08457d6e68b1f44042267e0d910a95ed055dd851871794af73dd2f5954b0c3f7df8ca7fd5c2d2c30fb6b36c2bb0d1a72e3862e23a898654a632d8f315eab38387cbc17a2a3485d7d5818865ea50c75cd267c18be7c97c91864abcd65da8257a54ea95caf8cf08d18bacdc8a607273ee5f3eb6ebf0054f6714943afda4c16fbdcb06286eb141f870f3fdc00ef7fc8357fd7551f756524f97afa60708ed37aa77c75474cdf5c8", 0xa7, 0x81}, {&(0x7f0000000600)="b81b3fdcef873cd95b760fb5ccc0818fffe53a03241fafa8a76af1e3d6d033a57cbd9997eb23d55777fdbb71438411b2409de2db2f64e8a3dc749daceeca084dfc254d5f4a0efba2dab5a3e46205184274bf5e380033f6b1ee73deac65464bc911df3e72b67a2d7c3eba01034906727c8dd96302c8e5c8d40989728847cbb711513d19dccbe95aff41c2fb3186a07a2659bf116d333bf38bb3b0bc35e97f4e58a62e242676896729ec4266918fb88ae126b79cde6c75cdef34d90554020be4ac849fe65d498b94c3d97c6c9efdde2300b14b20823135916993987800b667633ba0c3a21d00d7400b53520f433f98db805e86be7cbe", 0xf5, 0x3}, {&(0x7f0000000500)="5d840f195c5f8037549beb78bb793bcd0c50ed2390cb5da0030c8d8c4b0ba5a74a36ddd501410e052064a20146015d73278cfecf4ac3622fda04661ad8d8fadc4ebe55a7c9745a10c644a6de91738bc345f7cf8efa009c3cf44a5bdcf6e91200b2798910ab025ddfc5ccac59fa71832c282897a86edb9b12bef1dde7400b81e38abdada5077f23ebca81213f1908ef659b2a92f2e7523f083d561dc3", 0x9c, 0xffffffff}, {&(0x7f0000001a00)="65ff3def8b20308166c44e2da926d2492b86fa0d02a9ac2e0faa466ba061e8b27c9422f6deee18e671abfae94e1724297d6965320c5d58d38f2fd8c9adb0cb2eeaad02bcbabce510c5706b15a11ae7c26b841d47355d18e0d4db752d8f5f3852c6474a6488d148df764d21f905a98a6d46f44a2f23a3bd036855c52d7ec4dc82ce814891085bf5a0e045a24b0ba59aa0086a7cb7615c12f443c26c6b241056ccc01459852d54fdc97edf03c98669cd6f1de928068f34c69bc8602b941bec87aa39dc8bc33123b653069edfc1340889f6e60681ff747454c4ec555afc5ccd146508728735944954e5fb7cc5689b70ed42ea5a5350b225feb3b6b5dd2fa4788e1735b2891739f8f779ecb106f62fb8dd06f09e0070e63c0ea360122a94797338b2889d3c743a7fe8673012f44ddd1cefc1157e5c07bfb3f8a159f9f3c6a05f69614359344f8d0b9f1acec1b67944d3098a4057e13db0466f96cdfb59ea63f9c116e692fba7af5f495b47666a2db77185efefa4b4bf31770621e5ca502ddeb12e2954a33ed5c4e77d3a6f0652a4507e7527a251b27e2372ef8d18e0fc09af47455e43256b54f86caf650487010447a46edc8b3cd2ae3b86808e151a3c87d9a0c52cef553ec3f207ef3fd6956c7b813f7c5308d9e09851bd6fc1f8ade8169f090acb04eb26e5a176ba55225f7ce6fa2b18d7c7374d8b9cae212ddfd8cb83bd4339629dfb2197f691b6713f79fad4ff33728fb371a6d47215efe18cec6480804064e063d064cc1c3f3680278c3b522c21e2144e9a5b2e5222bff3e8149db1fa83246fe50148dd29ffcc0090bf951d599247bba04c978a6c50546dbfbfd82ce28b656f897d476d5de1c8d55b1b2903113642ec9ce19ffe505c8e59058dd10a8fa0230283119b92ad495e77cde0b49e4503dbac93b9d64a331dba0d6948d0ff541bad60d5a50e6d3a0983b5fd84f69e23960ab1e3606da0b1104d84407ab491637ff73523d5a15b808466f7dc37144131630e0b213a856267b00b57949cc2ea3f5ec24bd5506be8f4465d4f079af8f3bc39aa133581a28742b46bfe178ecba0f650f8d8eb21bc7be099789f0ce2a151ec8bb3574cc501b1ccbc2c7fd26a0e15c087ddab6c3f35d8f72868f57f6bae988909364ae6e5cfd940710422d5818997204087eb87d5d0f077a707bb70ae7c3822e8c60eca3851fb0327b382b56eef3995e8aa7d6d2a64d08364ca401fc5b508e5c092560d89ed2da96c8528e885b0a3774ae8cb8ad955da7e38c4be6bf9dbaf277f623981df195a45a6ebb871c0a654feae641f06c7096355d33789ce20c114d35da5edb8b7e2beb3aa9f50b0576f5a97e5acf143df081d00fb6b94eaaba86c02e96ee6dad895d2d286a54bc22c64f3f3608d62ae5f0f4949e4ea7a5ee6401369b485659c88cf8e5be4d4763004a4a73b0198ed38a0d69af4f1196f8519931244652d8315becff80161288dba496a7bf2b1b7a2ad8a89f4b8bbfb03143ee590543cdae5854cd7869566ea61a268814da194d43a350ccb704ffbc62782516784c339174e23d5616c9e99d4e7933b31397c5b4a6309ebd0488cba99f2fcaf42ee6c08785eee14fed6e57245562d8345354849a0f62672550a6de0ecacb523d8ddc45a5f3665e607a7fc3d2bacd209abd5324bee473bc9bd435a11a67c7707de00e74569056b9d5275b3a940f648a74ca3a039cc2f6aff2440a07b80fb6cd95b8090dad149d2e3dd587a8e547122bcb6370d26ebf2f8756a431c31fe732b76caa9f6ce0c201c84aa426604f253c32ee6942e16155a0aaaf50998df99d2fb27a2c83e45b37b4ea64188ab417559e93aaaf7913b9a5158b619507d685804c4cf8b9cdf00bcd8dc32ecf1a4c31390a0d72925ee1688b036f135ccccf3b6f1fc9a5b3d864ca70abcd8940d24bafadeb54df25ed5bb12036fe05041061739e1ca358d1ec42fb396290b9d9c04b8396b5d0ac503764ab3e49d24ecf6ff4e67c4c1db1bce3e7f9386dbf64b967b7203c12e3fbbf91d4c45e60b35d67f4f03f89c5b4e41cdbdf859b8808dc4c06a0d945cea664174e892c2d72fcf6dd5da7dea60bcfdb03164338fdab8582dceac25a468811c7cd2cb78a55c2228be5b913e4cc06afd6bddb770606dd111d0b0e907e97033d2cac8575aee13e825e7ff169e8dc0738442b9f1d403cd12ed69a9b4382f4a296a8139adeb36f75b56c4418317d6600492a7ade000227429ee89ecd723b31a3029c27efc6c626b38ec7c36d68e3e7177e0ea92da737c2438058091b0a16ae7f5a042973f1f3ae0aa927288ff3d2a80f8496036c3023f28c13fd952a22ea5f32a34b07fd07cd26020b300555800bc4daa429a1a405130393175aa825de9b00a2c4328bd6212bac993a7669a924299861396c37e32359a69bb6da2741823eb8cd78c88bd29085c63a450d5517b03ff900c2d55ad7c61f0b1ec2ea653481fd417e30132f87b0429b64c0e639bae99d2598c59fa412d2aaf0b422ad0ba99bdeb1ec916d39d28a5b89b368f542ac28f83607712d3b20ec16059b03b9b9ba95695d668c028e3f2be046ecc362e092534339c2485eb11147f3408db39af3ed0d888f81cbacab4d4ccf21aea9431a51dd596df90fbd2b94d098d7eefe22fe23ac8e2019f5d7519a8efce86ce2d0f18704a73650e976880dcf39b8886ec1a1eca759714baa240f1725e5397dfdb9056bafb3369c3b5d1907f8d55af920da4a4196b905c24d3678930c801662a6742777514daaca48881af090a1c76a128b58b558c214fd405f4993a45390a490cafa88c5204b5c165ab4deddd9e866f41edda09b46f5d9ad130cbf830468ed5d824a5a2afe495f2ffd071780e8b05ac97a4df0eb25a01994753178d7211bb4118a91fbe9259466d0be49096815e3828fb50bf3756ec6ec7b886bc44d09990291e11751993b651d318f28c168298bcc7fa04db2fc99db4b8a157b68abadb57309995407c1c99f3f5879881243439c32cba441aac0646cab25bc329143b1c75a3d7e24581c8895686e21767eeacbce07338d7c350a0959dcf8fd1156c12eaf6df4b2e9e35a0d59ca6625021f194d27d8568c767796e1564928634cdfde2f88d9b0f437b3358dc083c0f6542fdadec396caaf8f218e0fbcf4ce71fc1ce43eac70914b0b4c97f0d1999343cb89c796dfa49225f51d731452eea72e47bc9bf3ebf396f9746dbc50219a035eb701c28697703805a828f52ba11d91abc338432d81fac13323722a7386e975dc6854d28dccd28e38dc242a91e31d3f5c90e99f2e50289fe4ccbc337e7f89b1d66021d358285bed0715994edab9a5306116d914039e4ca2a95b37402232a0eb2e384e139c51d8100542efd683b6309c925c027dccf705380e407aa3067bedc850dd1eb7495cdb03f728c9c179ef116afc50925f21a8817a242fcf8833cba22baa1e594a01bc62f8e89fe77bd98f257701724ede4afbd11b70ee43d0f4ea65f653f82d78a60e86fcbf27d4315597c65b2280e31cb33bb677bc2693c8c450a67b568fcb46acc71b424327b296093c8bbd926ae16f0114cd6d979194d0a9b09e4bb0264081e6fd1cdde14b0b16b2227ec08be1c391e8f93de46f7d09669fe5e995ac9c63da1a87a47629e87c443f70c738cf600ca863225d9d78c1914465fe0967e43b6eb3879554477d85680329482cacbe85e3263c3575de375130979839d992378897b1c45e57c6f0aa465cf04bc7161ca71f7f2f507352b1f12c157aea96eed59bb428515f86ca3401c5e969e2f76624152a28404bfebc1b48c205268720a093cdc8cbdaee1831b7d72c59537f55b7a712b9f70f84b5fc4ce061b10b08e79eff13c5827a8db7756d1baeb83da0001228e53bef40004bf52107346cd6ce05e7c1916baedaca7f33e3f130ad229149a38cad40e9f60abbce2c2681bfffd392a0cfa1843e96d97b49d41f388626e2e8f1989ff4601ac0ae0105a47088e735f36524abcc92657fb3ed73810b092394b46b91b980a2869b28ff7166807d15c9041af44927938817c483929634a5a7549527bfa0c7629f7b3c4dbbdb31c824c34b7b53c05879cdbc7d8b8660466c38a5cb85657fcbc543bf2f9afa62c4b9d3d9b1938e6189ad3c01eeac3ee62bcdf88819e37fbf2ae27889ff7b96f0353458e3a4cdd655e872409c38f5d1b4979cbecbc781c76cd1cc5a2790c19cef174e8c045a83fff5265658d7a4cb4f3cc6e5773b9579faf18192897fb5c5c5d7beb5341b6860ff479c754c1b04332deac8ae4be838f24863e09d576c449353a3796468c4bcf3b1d5f752965903946e13a25b4f154a94130e8fcf3a67e4ec2827e02d609cd93ce9b6089a7e91bd6d28e9d5d620ad9115f607b88fde1bf770141759cf59ca000afb5d002d69a1dd6c2733fc89a99186a675e5b838b845756c252766de6635a0454e0032be5fbc591d98c6e1f3ea9393c76d276241630ba0dd089fc6e652224b7811c959d65ce825498376a6f43aab0281038b19eccf999f677dc03a91cbf1e00e2eee72a277ccc16d00fef36e8c75805343c98c24a7c67a6057124c3fd6886e0f1a6f2ea62ab1ee916bd34c178a531a773b1f7455b6cc3a56cc6b4231c00e2a7b15af19e2e21049f9c78bb118a82b819c76197fecb13ad72f8befefff356c98ccb0012fcb7b7f9dfc7a700cdce3ce8c64167bdcf6e75c555084cfc4ad6436b449b7d880fa4ce1dd51f7d6d02ddd70bf0222159558aaba96ee745d46ac94368562a761b6834a4d5fdb6144b47c60a37d8cb83c46f63825600992a8e3ec6d3c424657fa244f02239f497b5dbd9dc14f2738e542604d7f0dbd5eb2094fc939de08b87329b9c7b126e9145e1398ea8b068ddd31a27bd06175d7a6a003e3cccd3eb606da3b2ea204942d320da275e1e651299faee651022da41a8d3842c72821d7f0e423ac3349d11541f0d0ad7e74d5a20dc37ed62462654a4ce8f4309d2fe14bf6a8d8b4bcb0579578694ce8394ab9e9f1aa3a4091926cd18bd0f9fcc01a0c4ce967e26e9bb078fa30a8d4238caecafcfe502991dd79e31c412aeb91ce98d14e427c593cd235de8c27949d4ba53be8f9a0af4b397b1a79f2a7a339a69c144935d1ae59ce8ad163aefdc4c94d0b9294cd38cdc697ff0def8ee0b38eeab91d412da73f62bf9edd5f3bb9ce1d34f43301a7d05544d7b95eb6f70fc7716b8b2e3aaa7c00fefdecdeef3c7ad64897df7066daf3feb02ba997d3a896fd3bb7e2f2b48b11893a31cfd5724ed1fedaac9d8d5e43d53bec8263d6e779f042696480dc1786a6779fd1a4b0be86c1a3442a46b1cbb5af5e0b85eda64571f25a809793c0a7111a2f9cc8bc714a8a83d05fab24c7caf3ccfa23f2a18c49f70ce6397779f54c99e81088acf3196f3e3e9cdfed6b5c8f9ca03d216e933376e36a87bb2053532738fc08bf4837f83bd1adad0e37a958ebfbb57d8bcd92890208e2e40fdf8d754a0374c65e551c5d2ab3fc6f2efacf343fdac247c7c9ab4c1c4ade79a4b93c30ff3d89f8def6537a8d8d8b5b338bc79cdbcd81bdab4fb67639b48c4e9de1d25869b5f1883dd5d1f630944907ae5189589ee9bcae2694468799861aef338f4473b6fc3d9b6076aef3d523840841e03443a62217d9b57137f7fae2487497ce98fac9908a3d3600d1660a86c36b901702422b4ecf8bba002f23be7bd583bc93e3709fc47e1287c54daecd2e96506e29821ed734fe5bc218a92df7223133d43367e20680faa72552a4a61077290a98af59605666399706e9bf10bd79b", 0x1000, 0xa7c}, {&(0x7f0000000480)="964b86458c8e43b3539a528f5350c6aeed3aa9d3278baa1dd9b578aa4d2949e32487dfa2e7a622fdc492a375f3badaf06eff7893eb694e66bff04cb71193", 0x3e, 0x2}, {&(0x7f0000000700)="ce3a29d3158073dfd8db38aac704686ceb876ecf224a8db2e39eafa8d7584f25149199a432dcb520a653cc1a8f05bf8e83782be3a65c28e6088066cb175ba36874ae42c4f11d930efca04335f749e82c5e702e2fb0d75714d518a99545e9733b4b065a99", 0x64, 0x8}, {&(0x7f0000000840)="4ef6f886d1a5e44c71b353cfca75fbe8996ef1e5029422e2b9c045a5b83c33e3e315d2157542bc208411c46a9f8be288d91fe2b6cd9111be061b0c635dbcce72989398c2000b9827f198b70f6fcedd968ab9a7d978f2cff911658d142d3de8c59d71afde64b1364d2c90a4c3a1f6499339b54f527c6491a5d0253128e71dcc890d3c4c7f12b60aba7464e76d1474c364bf9f956b77d5364d3d74b8468215664234996f107a0d4aed2f0848f3029f64cfbb2a4ac28347bb6ae865b10a490abc5b88d16779de53558f917b867cec6d0b391ee062b1fe557667d7d7e959d50b84fd007fd81f50500ff9d68801116cad8990", 0xf0, 0x8}, {&(0x7f0000000780)="a9eba87e932f2fb0cca5fca884bc0034e4", 0x11, 0x400}, {&(0x7f0000000940)="6e5a02cb611fc965063c416a9457642c01e78947b1885ad600fbb46892f23a4ed353254db6c7da23c84c278c1d273a9c599f90da54db8ea795c8a66c018f2e80aff3412f36c59a9715bb6cfb6889", 0x4e, 0xc8f}, {&(0x7f00000007c0)="496e895c0f66651a775d82c7cab719e54d7e171386b36b1ecb94c17690a2d4db4f459a37918f22b3589d53f2a25f95b00b694ed1ade431ff", 0x38, 0x3}], 0x40000, &(0x7f00000009c0)={[{@noheap='noheap'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@inline_xattr_size={'inline_xattr_size', 0x3d, 0x7ff}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '+\'/systemvboxnet1[cgroup'}}]}) 15:51:06 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x402401, 0x0) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) pipe2$9p(&(0x7f0000000000), 0x84800) 15:51:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") perf_event_open(&(0x7f0000000040)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) getsockopt$inet6_int(r1, 0x29, 0x24, 0x0, &(0x7f0000000000)) 15:51:06 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x2000, 0x0) r1 = dup(r0) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000040)={0x55, 0x0, 0x0, {}, {}, @rumble}) 15:51:06 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x4c00}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:06 executing program 4: syz_read_part_table(0x81, 0xe4, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x74, 0x1) write$P9_RLERRORu(r0, &(0x7f0000000040)={0x1e, 0x7, 0x2, {{0x11, '}securitybdev$}-}'}, 0x8}}, 0x1e) 15:51:06 executing program 3: 15:51:06 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') ioctl$NBD_CLEAR_SOCK(r0, 0xab04) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) r1 = semget$private(0x0, 0x1, 0x43) semctl$IPC_RMID(r1, 0x0, 0x10) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x9, 0x3, 0x2d0, 0x0, 0x0, 0x0, 0x0, 0x130, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, &(0x7f0000000040), {[{{@uncond, 0x0, 0xc8, 0x130, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x4a0, 0x201}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x2, 0x3ff, 0x0, 0x7, 'pptp\x00', 'syz0\x00', 0x8001}}}, {{@uncond, 0x0, 0xe8, 0x108, 0x0, {}, [@common=@osf={0x50, 'osf\x00', 0x0, {'syz1\x00', 0x4, 0x5}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x330) 15:51:06 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x5865}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:06 executing program 4: syz_read_part_table(0x401, 0xfffffffffffffdbb, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f0000000080)=0x4) syz_read_part_table(0x78, 0xaaaaaaaaaaaad99, &(0x7f0000000340)=[{&(0x7f0000000540)="5af4e78813734d2153fcb576d2ee3453765b9f470911b3fcfb02969478467329005da4a1657557f43baa1c65b209b23b5e5e536f7188262ad65636f4ebffd07f46e65fb70d9962c1f4fc588dd5859f6e4803c4c0e4584b9347a9db85d3c810f1052aefae27b6bafc0c17b91d3a9cc1cb39fce93f5c92e429b416cb1a76cbe262e662252010c9412ba49ea34e4defe1518e484db28af51cd9db56e78213854e0dfd56f213fb3905d9133728b503ef3958d8847a7d439322380bab489463c5df8d13d79c7e561695635787ebf7f82dd19ceb3bf2953fc218ee3830cfc7a01ea7619a42d63bdf72962f221c2b11bd0417f00f8c3cce1d08f31a25f6b55335744f561b0650f0d8e4f518596b8fedde4942212c2e7b05f42cc2a7326542b07614ddf1164abae89c4f32affd2c59ff26c615306b2aefdb01999696c25b311cf1129625e4d091d7ad5de303c257c4612d9af032412d", 0x89, 0x284643bc}, {&(0x7f00000002c0)="63f55de4c25160ece7f7a7f309dfba3db8ea8f8b17f2b174360127f8a40640ddf6d4f116", 0x24, 0x2}, {&(0x7f00000004c0)="e26adc03095506ca280a851f8d441436d615028e901e1ac5ad90261cad021c0560420e8d380c3d81aab9901e374203730cb4e973357333cb0ba88072995986845366c5f1fa906745ff9be63b4990491e28b5de8ce82edf1ea4fb28611f6105c5d82e23d7a959de", 0x259, 0x7fff}]) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000000c0)={r1, @in={{0x2, 0x4e23, @multicast2}}, 0xfffffffffffff001, 0x5}, &(0x7f0000000180)=0x90) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:51:06 executing program 3: 15:51:06 executing program 0: 15:51:06 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000001680)=@sg0='/dev/sg0\x00', &(0x7f00000016c0)='./file1\x00', &(0x7f0000001700)='befs\x00', 0x100000, &(0x7f0000001740)='-cpuset^:selinux\x00') mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) clock_gettime(0x0, &(0x7f00000015c0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001440)=[{{&(0x7f0000000340)=@nfc_llcp, 0x80, &(0x7f00000003c0)=[{&(0x7f0000001a00)=""/4096, 0x1000}], 0x1}, 0xffffffffec81f966}, {{&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000500)=[{&(0x7f0000000480)=""/12, 0xc}, {&(0x7f0000000600)=""/225, 0xe1}], 0x2}}, {{&(0x7f0000000540)=@sco, 0x80, &(0x7f0000000700)=[{&(0x7f0000002a00)=""/4096, 0x1000}], 0x1, &(0x7f0000000740)=""/23, 0x17}, 0x2bc}, {{&(0x7f0000000780)=@xdp, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000840)=""/3, 0x3}, {&(0x7f0000000880)=""/47, 0x2f}, {&(0x7f00000008c0)=""/235, 0xeb}, {&(0x7f00000009c0)=""/123, 0x7b}, {&(0x7f0000000a80)=""/80, 0x50}, {&(0x7f0000000b00)=""/243, 0xf3}], 0x6, &(0x7f0000000c80)=""/148, 0x94}, 0x1}, {{0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000d40)=""/131, 0x83}, {&(0x7f0000000e00)=""/246, 0xf6}, {&(0x7f0000000f00)=""/31, 0x1f}], 0x3, &(0x7f0000000f80)=""/199, 0xc7}, 0x382}, {{&(0x7f0000001080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000001380)=[{&(0x7f0000001100)=""/241, 0xf1}, {&(0x7f0000001200)=""/121, 0x79}, {&(0x7f0000001280)=""/230, 0xe6}], 0x3, &(0x7f00000013c0)=""/78, 0x4e}, 0x5}], 0x6, 0x40000002, &(0x7f0000001600)={r1, r2+30000000}) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000001640)={0x9, [0x1ff, 0x9, 0x4000000, 0x8, 0x9, 0x75, 0x400, 0x9, 0x0]}, 0x16) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r4, 0x7fffc) 15:51:06 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80000, 0x0) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000240)={"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"}) 15:51:06 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x6000}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:06 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000004c0)=[{0x6, 0x0, 0x0, 0x50000}]}) socketpair(0x11, 0x6, 0x0, 0x0) 15:51:06 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x6558}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:06 executing program 0: readlink(0x0, 0x0, 0x0) r0 = socket(0x11, 0x3, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1002, &(0x7f00000000c0)=0x80000000c5, 0x4) sendmsg(r0, &(0x7f0000005e80)={&(0x7f00000044c0)=@in6={0x18, 0x0, 0x4}, 0xc, &(0x7f0000005c00)=[{&(0x7f0000005800)="dd22872eb1c7cdf3371e889247e202cab1d9c749811124f17ae7e92ac761b8f60b64f80c48ec4a3e78d8f355aece5cbabb574c347a6ab880eb82267d3d41e8939709cdcf414c90ea8da411ca1bea550d7cbbd93bf82e5d327f6002bd32e7e8cb39e27fecfec2a82b5cf9e40abf7ac780a7e9fc135ba477860cec65aca677460d2ab31958e236715a7e3a37a9cf08ec775d80f4fcd98c8fdc669fe5b5383534b355df14f4eac5bbd73ec9f39305b4ba19bef9dc6c0cc52ee7f2dbc7c2", 0xbc}, {0x0}], 0x2}, 0x4) r1 = dup(r0) readv(r1, &(0x7f0000004500)=[{&(0x7f0000000140)=""/131, 0x83}, {&(0x7f0000000200)=""/251, 0xfb}, {&(0x7f0000000300)=""/139, 0x8b}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/6, 0x6}, {&(0x7f0000001400)=""/189, 0xbd}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f00000024c0)=""/4096, 0x1000}, {&(0x7f00000034c0)=""/4096, 0x1000}, {&(0x7f00000044c0)}], 0xa) 15:51:06 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='./file0\x00') 15:51:07 executing program 5: r0 = semget(0x2, 0x3, 0x44e) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000b00)=[0x200]) r1 = semget$private(0x0, 0x2, 0x8) semop(r1, &(0x7f0000000a00)=[{0x7, 0x4, 0x1000}, {0x2, 0x3, 0x800}, {0x4, 0x4, 0x800}, {0x0, 0x8, 0x1000}, {0x2, 0x7ff, 0x1800}, {0x3, 0x2, 0x800}, {0x3, 0x4, 0x800}], 0x7) r2 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x4, 0x20002) recvfrom$unix(r2, &(0x7f0000000080)=""/33, 0x21, 0x2, &(0x7f0000000a80)=@file={0x1, './file0\x00'}, 0x6e) ioctl$VIDIOC_G_ENC_INDEX(r2, 0x8818564c, &(0x7f00000001c0)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$unix(r2, &(0x7f0000000b40)=@abs, &(0x7f0000000a40)=0x6e, 0x800) mount(0x0, 0x0, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r3, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r3, 0x0, 0x0, 0x4) semctl$IPC_RMID(0x0, 0x0, 0x10) mount$9p_rdma(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x18, &(0x7f0000000100)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@common=@access_any='access=any'}], [{@obj_role={'obj_role', 0x3d, 'selinuxmime_type-&wlan0em1}eth1'}}, {@permit_directio='permit_directio'}, {@obj_type={'obj_type'}}]}}) 15:51:07 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x6800}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:07 executing program 3: r0 = gettid() shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ff9000/0x3000)=nil) getgid() shmctl$SHM_STAT(0x0, 0xd, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffa000/0x2000)=nil) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) pipe(0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) chdir(0x0) tkill(r0, 0x1000000000016) 15:51:07 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000340)={0x8572, 0x1, 0x1ff, 0x8, 0xb67}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:51:07 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x2000, 0x0) fallocate(r0, 0x2e, 0xffff, 0x2) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x10400, &(0x7f0000000240)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@metacopy_on='metacopy=on'}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}], [{@euid_eq={'euid', 0x3d, r1}}]}) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x8}) 15:51:07 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x6c00}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:07 executing program 3: 15:51:07 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semget(0x1, 0x3, 0x0) semget$private(0x0, 0x0, 0x2) semget$private(0x0, 0x7, 0x400) semget(0x0, 0x0, 0x100) semget(0x1, 0x0, 0x10) semget(0x0, 0x2, 0x10) semget$private(0x0, 0x1, 0x2c) r0 = semget(0x1, 0x7, 0x10) semctl$IPC_RMID(r0, 0x0, 0x10) 15:51:07 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) r1 = open(&(0x7f0000000040)='./file0\x00', 0x50000, 0xc5) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f00000000c0)={0x3, 0x8}) ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f0000000080)={0x1, r1, 0x1}) 15:51:07 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x7400}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:07 executing program 0: 15:51:07 executing program 3: 15:51:07 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) r0 = semget(0x2, 0x7, 0x1) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)=0x0) r2 = getegid() stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000280)={{0x0, r1, r2, r3, r4, 0x140, 0x81}, 0xff, 0x9, 0x400}) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:51:07 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x7a00}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:07 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) getresuid(&(0x7f00000003c0), &(0x7f0000000400)=0x0, &(0x7f0000000440)) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000480)=@v3={0x3000000, [{0x7, 0x5}, {0x1, 0x8}], r1}, 0x18, 0x1) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r2, 0x7fffc) 15:51:08 executing program 3: 15:51:08 executing program 0: 15:51:08 executing program 5: r0 = semget$private(0x0, 0x0, 0x480) semop(r0, &(0x7f0000000000)=[{0x1, 0x2}, {0x1, 0x1, 0xa039b38ea3a26203}, {0x0, 0x5}, {0x4, 0x200, 0x1800}, {0x3, 0xad, 0x1000}, {0x6, 0x10001, 0x1000}, {0x4, 0x3bd, 0x1000}, {0x2, 0x3, 0x800}], 0x8) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000480)=[0x200]) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x5, &(0x7f0000000400)=[{&(0x7f0000000100)="73c97a9a34c0f793aa85fbf95f73c6bf23fe52fc069d859a7f634cf6176cf8b6b83324d48d725abdb9e1b015aa4091a99c1ce89e608653fe4f9d61c390672b9ee1f95029b74ed01f920efaa2ad6b74d4f0f6d58322f36345a69c0a5cadb73e5decc6879f1196427a5a625e2f8ed761b453904680d5e581572ef6787a9d", 0x7d, 0x2}, {&(0x7f0000000180)="c687e1c4f7bf5039dff46a55d90db9b89d2823f9c85d4a38c47c041d4b0e980c3aa86026c5564efc43607e3cd2c3edfa7977b9df5174e61859403e0e94c803b0d73369553d649c3abff19fc41a3a104b178759dae1da0b4040cedad8767165324a", 0x61}, {&(0x7f0000000200)="3c56afdf8c10afeaeb146ee4b50873366cd23d179c72ed0699cb362027a572cd14b01a07a075bf656aa572b4603bd69ecf3f201ef3f567c35b13580597ebe339c3328cf5a30dc1695ee763536a4d8440171de32c4d32304a3655086f57fbca5e34076e08f56cd2d9be988af325f85a3195ba5642bb1351d64a833baf95fb4a173f1dd2c7e2dddf939c999995b628876fcf10ddacdc809643658149af5e0dc69c06d9bb50c9b1dfe5797484d28b188b", 0xaf, 0x1ff}, {&(0x7f00000002c0)="d49aae3dc1aa65065894464dc4302704c83b90a98e0576d04d44b1d9d6b59e98992286f4e6b1145c406b0ade536916c02dc3b4fc8ced8d2c3e3fec63a0fa0e3b02e624f32add3edb47d5838ccc054408ca7e05653594771d2558ac754a7d4b374701252f5dceee2fd7d4463d8cf5343bc9de4fa2219a1e342ad5e7bd59247e40503637607db9c37fe519c10133ab272b07e2703cded4e20f7da8343e09ac34ee99989362064dd3c4160e4c99e8a8cf90b5339a61787ab9d266af85e1d17006069ab52b347920f2baa55c7979410d105874cf1dba12e1f2618338d48afa06b26c05f6575277663e32af60b97ac9c41ef6c9", 0xf1, 0x1b}, {&(0x7f00000003c0)="789c4a19db96344a9316e186bb39f10f65010bf5b277e437df55d9cb0713bd97f232134ccf399a0bb6ea0ced3505a7aef9", 0x31, 0xff}], 0x0, 0x0) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:51:08 executing program 3: 15:51:08 executing program 4: 15:51:08 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x8100}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:08 executing program 0: 15:51:08 executing program 3: 15:51:08 executing program 5: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x222900, 0x30) ioctl$RTC_WIE_ON(r0, 0x700f) semctl$IPC_RMID(0x0, 0x0, 0x10) 15:51:08 executing program 4: 15:51:08 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x9d19}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:08 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x2ce8180520572850) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:51:08 executing program 0: 15:51:08 executing program 4: 15:51:08 executing program 3: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) clone(0x8000000000041fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x26, &(0x7f00000000c0)) move_pages(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:51:08 executing program 5: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000140)) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x842) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000200), &(0x7f00000000c0)=0xc) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(0x0, 0x0, 0x10) r2 = semget(0x3, 0x2, 0xa0) semctl$SETALL(r2, 0x0, 0x11, &(0x7f0000000040)=[0x2, 0xab]) 15:51:08 executing program 0: ioctl(0xffffffffffffffff, 0x4, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{}, {}]}) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x40, 0x0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f00000008c0)=ANY=[@ANYBLOB]) r2 = memfd_create(&(0x7f0000000640)='\x06\x00\x00\xb6\xafTJ\xa24\xbe\x02\xff\x8b\x90\x8a\xd3\xb3\x8cm\n\x94E\xcb\xec\xfcMpG\x1f\xdc\xb2\bK\x90\xbc\x9e\x04MP)\xb0~*#b\xa1F\x99\xe0\x0eD\xc60\xde?\xcc\xaa\\Y\xe2\x8f\x1b\x01\xe9\xa6\xb1$U\x94\xea#\xd3\xb7\xf1\x8b\xda\xba||\xeeZ+\xed^6\xd1.\xc0\x029\xd8\xb4]\xea\x88\x95\xc0Km\x10\xebP9\xb5\xe6I,tx\xaa]\xfeH\xff\b4\x8fHmj\x91@\xc6y\xd9\x12\xbe\xe1 S\xda~\x89\xf5u*\x92\x05$Hvo\xfa}\x15\xec\x85\x85\x19\x18\xcd\xb4\x8fyR\xeec!\xa9&\xad\xbd\xdd\xa6\x19j\x04\v\x80a\r\x9b(*\xafS\xd7 \xd2D\x06nIQ\x0e\xb1\xf3)\xbd\xaa\xa1\xf2\xadh\v\xd3l\xa7\x9c\x9f\xde(5\x9c_\xc3M\xbf(\xb4\xb8\x89e5q\xf4oI\xfd>\x8d\x19V?#\x95\xf3l\xd3\"?/t\x1aR9\xce\xc1\xaf/\xae\xd7\xd6a\xa01>', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000780)={0x0, 0x4000}) lsetxattr$security_capability(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='security.capability\x00', &(0x7f0000000740)=@v2={0x2000000, [{0xc75, 0x81}, {0x6, 0x8}]}, 0x14, 0x3) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2d70696473202d706964cb7c8dd77a2dd02b262fd3c8d01ff07320"], 0x1b) fallocate(r0, 0x11, 0x0, 0xc00000) 15:51:08 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0xc000}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0xc2, 0x0, 0x2, 0x46a}) 15:51:08 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0xd8c) r2 = gettid() r3 = socket$inet6(0xa, 0x400000000001, 0x0) sync_file_range(0xffffffffffffffff, 0x2, 0x8, 0x0) close(r3) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x5002}) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x104040}, 0xc, &(0x7f00000001c0)={&(0x7f0000000480)={0xd8, 0x37, 0xd, 0x70bd2d, 0x25dfdbfc, {0x20}, [@typed={0xb4, 0x5e, @binary="96d2d9526884e6df38ec3100f5385d5fff2a49302985fdb1df71ea10fdf2363b8acd7923d98863d2f8a2217b34c3b22d7946abbf616284ec61d01de75f7ca66ffc7c53df23cb4bdc855a319a5dee1e528ad822e59f43794561a3a35051703875c703c472abaecd49df175bc4621e252c7320b181fb6f7b3c9e483d4e2bea5432898fa4c8db3f86a92ac2226215ebf3e6e9fbf6b24e0e7120a22c25afd899ed353484b9a0a2525d2ccf4fcc178a32"}, @typed={0x8, 0x95, @pid=r2}, @typed={0x8, 0x23, @u32=0x8}]}, 0xd8}, 0x1, 0x0, 0x0, 0x800}, 0x8804) getsockopt$sock_int(r5, 0x1, 0x1d, 0x0, &(0x7f0000000300)) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_GETFSLABEL(r4, 0x81009431, 0x0) write(r7, &(0x7f00000001c0), 0x6e1b9aed) read(r6, &(0x7f0000000200)=""/250, 0x50c7e3e3) sendfile(r3, r5, &(0x7f0000d83ff8), 0x8000fffffffe) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) setsockopt$inet_tcp_buf(r5, 0x6, 0x1f, &(0x7f0000000000)="6fdd901946d6a5c8942401f4db03d28100b1843719e3a6f4e7b5fb152887df", 0x1f) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) clock_gettime(0x0, &(0x7f0000000040)) nanosleep(0x0, &(0x7f0000000140)) tkill(r2, 0x15) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) tkill(r2, 0x1000000000016) 15:51:08 executing program 5: r0 = semget(0x1, 0x0, 0x56) semctl$GETALL(r0, 0x0, 0xd, &(0x7f00000000c0)=""/205) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(0x0, &(0x7f0000000100), 0x2d) semctl$IPC_RMID(r0, 0x0, 0x10) 15:51:09 executing program 3: r0 = eventfd2(0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x220141042, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) read$eventfd(r0, &(0x7f0000000000), 0x3ed) ftruncate(r1, 0x280080) sendfile(r0, r1, 0x0, 0x7fffffff) 15:51:09 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = open(&(0x7f0000000340)='./file0/file0\x00', 0x505000, 0x40) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x1) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) write$uinput_user_dev(r1, &(0x7f0000000a80)={'syz0\x00', {0x3, 0x7ff, 0x75814137, 0xd23}, 0x3d, [0x2, 0x100000001, 0x8, 0x4, 0x20, 0x80000000, 0x5, 0x0, 0x7fffffff, 0x81, 0xffffffffffffffbe, 0x4, 0x5, 0xb419, 0xca, 0x3, 0x7, 0xfe, 0xfffffffffffffffa, 0x164, 0x1, 0x5, 0x7, 0x3, 0x5, 0x1, 0x9, 0x9, 0x401, 0x80000001, 0xfffffffffffffffa, 0x3, 0x2, 0x0, 0x7, 0x0, 0x2d412087, 0x0, 0x3b9, 0xe000000000000000, 0xb08e, 0x0, 0x3ff, 0xbb, 0x2, 0x1d5d, 0xffffffffffffffd1, 0x7, 0x401, 0x4b54, 0x2, 0x3, 0x101, 0x100, 0x8, 0xcf, 0x1ff, 0x7, 0x8, 0x8, 0x400, 0x2, 0x1, 0x9], [0x2, 0x5, 0x3, 0x7, 0x2, 0x8eb8, 0x10000000000000, 0x0, 0x6, 0x7, 0x98b, 0x0, 0xdf07, 0x9, 0x7, 0xfa33, 0x1, 0x7, 0x5, 0x3ff, 0x1, 0x9, 0x6, 0x0, 0x464, 0x3, 0x8001, 0x2f30, 0x3ff, 0x6, 0x7fff, 0x7fffffff, 0x81, 0x8, 0x6, 0x0, 0x48, 0x1, 0x100, 0xffffffffffff1bea, 0xaf26, 0x5, 0xf541, 0x6, 0x1, 0x9, 0x9, 0x7, 0x64d0, 0x0, 0x0, 0x0, 0x1a, 0x81, 0x5, 0x80, 0x1000, 0x97, 0x0, 0x0, 0x80000000, 0x2, 0xffffffff, 0xc59], [0x3cf, 0x5, 0xc0000000, 0x8, 0x7fff, 0x8, 0x7, 0x1364, 0xfffffffffffff4ac, 0x1, 0x3, 0xbb, 0x1, 0x6, 0x20, 0x800, 0xb2a2, 0x1, 0x7fffffff, 0x1, 0x6, 0x100000000, 0xca95, 0x1, 0x81, 0x0, 0x4, 0xffffffffffff0000, 0x6, 0x20000, 0x0, 0x7ff, 0x81, 0x2, 0xfffffffffffffffb, 0x8, 0xbbeb, 0x8, 0x2a, 0x2, 0x7, 0x8, 0xffff, 0x80000001, 0x3f, 0x1, 0x400, 0x9, 0xfffffffffffffff8, 0x2, 0x3, 0x7fff, 0x5, 0x5f87, 0x8, 0x5, 0x9, 0xfffffffeffffffff, 0x8, 0x9, 0x0, 0x7fff, 0x6, 0x20], [0x6, 0xfff, 0x0, 0x7, 0x20, 0x1, 0x8, 0x3, 0x4, 0xc6, 0x4, 0x7, 0xfff, 0xfffffffffffffff8, 0x5, 0xd1c, 0x1f, 0x3a0, 0x80000000, 0xfffffffffffffeff, 0xd1, 0xfffffffffffffffa, 0xdacb, 0x8, 0x7, 0x2, 0x9, 0x1, 0x122, 0xfff, 0x1000, 0xc39, 0x100000000, 0x20, 0x0, 0x0, 0x7, 0x7f, 0x1f, 0x4, 0x80, 0x4, 0x10001, 0x1, 0xe2f4, 0x9f, 0x5, 0xff, 0x81, 0x6, 0x3, 0x55, 0xfbc, 0x3, 0xa1, 0x8, 0x0, 0x3, 0x6, 0x7c8, 0x401, 0x2, 0xe4b, 0x200]}, 0x45c) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r2, 0x7fffc) 15:51:09 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0xc00e}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') lseek(r1, 0x0, 0x0) 15:51:09 executing program 0: ioctl(0xffffffffffffffff, 0x4, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{}, {}]}) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x40, 0x0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f00000008c0)=ANY=[@ANYBLOB]) r2 = memfd_create(&(0x7f0000000640)='\x06\x00\x00\xb6\xafTJ\xa24\xbe\x02\xff\x8b\x90\x8a\xd3\xb3\x8cm\n\x94E\xcb\xec\xfcMpG\x1f\xdc\xb2\bK\x90\xbc\x9e\x04MP)\xb0~*#b\xa1F\x99\xe0\x0eD\xc60\xde?\xcc\xaa\\Y\xe2\x8f\x1b\x01\xe9\xa6\xb1$U\x94\xea#\xd3\xb7\xf1\x8b\xda\xba||\xeeZ+\xed^6\xd1.\xc0\x029\xd8\xb4]\xea\x88\x95\xc0Km\x10\xebP9\xb5\xe6I,tx\xaa]\xfeH\xff\b4\x8fHmj\x91@\xc6y\xd9\x12\xbe\xe1 S\xda~\x89\xf5u*\x92\x05$Hvo\xfa}\x15\xec\x85\x85\x19\x18\xcd\xb4\x8fyR\xeec!\xa9&\xad\xbd\xdd\xa6\x19j\x04\v\x80a\r\x9b(*\xafS\xd7 \xd2D\x06nIQ\x0e\xb1\xf3)\xbd\xaa\xa1\xf2\xadh\v\xd3l\xa7\x9c\x9f\xde(5\x9c_\xc3M\xbf(\xb4\xb8\x89e5q\xf4oI\xfd>\x8d\x19V?#\x95\xf3l\xd3\"?/t\x1aR9\xce\xc1\xaf/\xae\xd7\xd6a\xa01>', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000780)={0x0, 0x4000}) lsetxattr$security_capability(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='security.capability\x00', &(0x7f0000000740)=@v2={0x2000000, [{0xc75, 0x81}, {0x6, 0x8}]}, 0x14, 0x3) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2d70696473202d706964cb7c8dd77a2dd02b262fd3c8d01ff07320"], 0x1b) fallocate(r0, 0x11, 0x0, 0xc00000) 15:51:09 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0xf000}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:09 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="020a000007000000000000000000000c05001a00000000000000000000000000ffff305add29ffffffff0000000000590000000000002600"], 0x38}}, 0x0) 15:51:09 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000100)={0x1, "65676440fd3fa3e3f68fa9a13b469c7e3dd78e3805e1ed9463f4682b4efef141"}) 15:51:09 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0xff03}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:09 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x6, 0x319180) r2 = fcntl$getown(r0, 0x9) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000380)=r2) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r3 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002c00)=[{{&(0x7f0000000400)=@caif, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000000600)=""/141, 0x8d}, {&(0x7f00000006c0)=""/87, 0x57}, {&(0x7f0000000740)=""/153, 0x99}, {&(0x7f0000000840)=""/80, 0x50}, {&(0x7f00000008c0)=""/167, 0xa7}, {&(0x7f0000000980)=""/80, 0x50}, {&(0x7f0000000a80)=""/198, 0xc6}, {&(0x7f0000000300)}, {&(0x7f0000000b80)=""/147, 0x93}], 0xa, &(0x7f0000000480)=""/1, 0x1}, 0x9}, {{&(0x7f0000000d00)=@nfc_llcp, 0x80, &(0x7f0000001480)=[{&(0x7f0000000d80)=""/217, 0xd9}, {&(0x7f0000000e80)=""/191, 0xbf}, {&(0x7f0000000f40)=""/110, 0x6e}, {&(0x7f0000000fc0)=""/110, 0x6e}, {&(0x7f0000001a00)=""/4096, 0x1000}, {&(0x7f0000001040)=""/135, 0x87}, {&(0x7f0000001100)=""/157, 0x9d}, {&(0x7f00000011c0)=""/203, 0xcb}, {&(0x7f00000012c0)=""/230, 0xe6}, {&(0x7f00000013c0)=""/156, 0x9c}], 0xa, &(0x7f0000000a00)=""/52, 0x34}}, {{&(0x7f0000001540)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f00000015c0)=""/198, 0xc6}, {&(0x7f00000016c0)=""/67, 0x43}, {&(0x7f0000001740)=""/1, 0x1}, {&(0x7f0000001780)=""/221, 0xdd}, {&(0x7f0000001880)=""/250, 0xfa}, {&(0x7f0000001980)}, {&(0x7f0000002a00)=""/41, 0x29}, {&(0x7f0000002a40)=""/212, 0xd4}], 0x8, &(0x7f0000002bc0)=""/7, 0x7}, 0x8001}], 0x3, 0x10002, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r3, 0x7fffc) 15:51:09 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000100)={0x1, "65676440fd3fa3e3f68fa9a13b469c7e3dd78e3805e1ed9463f4682b4efef141"}) 15:51:09 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000100)={0x1, "65676440fd3fa3e3f68fa9a13b469c7e3dd78e3805e1ed9463f4682b4efef141"}) 15:51:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000200)={0x2, 0x0, [{}, {0x80000001, 0x2, 0x1}]}) 15:51:10 executing program 0: ioctl(0xffffffffffffffff, 0x4, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{}, {}]}) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x40, 0x0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f00000008c0)=ANY=[@ANYBLOB]) r2 = memfd_create(&(0x7f0000000640)='\x06\x00\x00\xb6\xafTJ\xa24\xbe\x02\xff\x8b\x90\x8a\xd3\xb3\x8cm\n\x94E\xcb\xec\xfcMpG\x1f\xdc\xb2\bK\x90\xbc\x9e\x04MP)\xb0~*#b\xa1F\x99\xe0\x0eD\xc60\xde?\xcc\xaa\\Y\xe2\x8f\x1b\x01\xe9\xa6\xb1$U\x94\xea#\xd3\xb7\xf1\x8b\xda\xba||\xeeZ+\xed^6\xd1.\xc0\x029\xd8\xb4]\xea\x88\x95\xc0Km\x10\xebP9\xb5\xe6I,tx\xaa]\xfeH\xff\b4\x8fHmj\x91@\xc6y\xd9\x12\xbe\xe1 S\xda~\x89\xf5u*\x92\x05$Hvo\xfa}\x15\xec\x85\x85\x19\x18\xcd\xb4\x8fyR\xeec!\xa9&\xad\xbd\xdd\xa6\x19j\x04\v\x80a\r\x9b(*\xafS\xd7 \xd2D\x06nIQ\x0e\xb1\xf3)\xbd\xaa\xa1\xf2\xadh\v\xd3l\xa7\x9c\x9f\xde(5\x9c_\xc3M\xbf(\xb4\xb8\x89e5q\xf4oI\xfd>\x8d\x19V?#\x95\xf3l\xd3\"?/t\x1aR9\xce\xc1\xaf/\xae\xd7\xd6a\xa01>', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000780)={0x0, 0x4000}) lsetxattr$security_capability(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='security.capability\x00', &(0x7f0000000740)=@v2={0x2000000, [{0xc75, 0x81}, {0x6, 0x8}]}, 0x14, 0x3) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2d70696473202d706964cb7c8dd77a2dd02b262fd3c8d01ff07320"], 0x1b) fallocate(r0, 0x11, 0x0, 0xc00000) 15:51:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="020a000007000000000000000000000c05001a00000000000000000000000000ffff305add29ffffffff0000000000590000000000002600"], 0x38}}, 0x0) 15:51:10 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x10020}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:10 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000100)={0x1, "65676440fd3fa3e3f68fa9a13b469c7e3dd78e3805e1ed9463f4682b4efef141"}) 15:51:10 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffe11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) r2 = creat(&(0x7f0000000400)='./file0/file0\x00', 0x140) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000440)=0xe8) r4 = getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000700)={{{@in, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) r7 = getuid() mount$fuseblk(&(0x7f0000000340)='/dev/loop0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuseblk\x00', 0x400, &(0x7f0000000a80)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xd000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xffff}}, {@max_read={'max_read', 0x3d, 0xfffffffffffff998}}], [{@fowner_gt={'fowner>', r5}}, {@subj_type={'subj_type', 0x3d, 'bpf\x00'}}, {@subj_user={'subj_user', 0x3d, '-em0'}}, {@fowner_lt={'fowner<', r6}}, {@fsmagic={'fsmagic', 0x3d, 0xd5}}, {@euid_gt={'euid>', r7}}, {@subj_role={'subj_role', 0x3d, 'U-'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@smackfshat={'smackfshat', 0x3d, 'trusted.overlay.nlink\x00'}}]}}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:51:10 executing program 4: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000100)={0x1, "65676440fd3fa3e3f68fa9a13b469c7e3dd78e3805e1ed9463f4682b4efef141"}) 15:51:10 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000080)={0x0, 0x32315241}) 15:51:10 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x33fe0}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:10 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3b3, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f00000000c0)={0x9a0000, 0x7, 0x0, [], 0x0}) 15:51:10 executing program 4: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000100)={0x1, "65676440fd3fa3e3f68fa9a13b469c7e3dd78e3805e1ed9463f4682b4efef141"}) 15:51:10 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)) ioctl$TIOCGPGRP(r1, 0x540f, 0x0) fcntl$getownex(r1, 0x10, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r4 = gettid() getpgrp(r4) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000005, 0x0) inotify_init1(0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 15:51:10 executing program 0: ioctl(0xffffffffffffffff, 0x4, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{}, {}]}) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x40, 0x0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f00000008c0)=ANY=[@ANYBLOB]) r2 = memfd_create(&(0x7f0000000640)='\x06\x00\x00\xb6\xafTJ\xa24\xbe\x02\xff\x8b\x90\x8a\xd3\xb3\x8cm\n\x94E\xcb\xec\xfcMpG\x1f\xdc\xb2\bK\x90\xbc\x9e\x04MP)\xb0~*#b\xa1F\x99\xe0\x0eD\xc60\xde?\xcc\xaa\\Y\xe2\x8f\x1b\x01\xe9\xa6\xb1$U\x94\xea#\xd3\xb7\xf1\x8b\xda\xba||\xeeZ+\xed^6\xd1.\xc0\x029\xd8\xb4]\xea\x88\x95\xc0Km\x10\xebP9\xb5\xe6I,tx\xaa]\xfeH\xff\b4\x8fHmj\x91@\xc6y\xd9\x12\xbe\xe1 S\xda~\x89\xf5u*\x92\x05$Hvo\xfa}\x15\xec\x85\x85\x19\x18\xcd\xb4\x8fyR\xeec!\xa9&\xad\xbd\xdd\xa6\x19j\x04\v\x80a\r\x9b(*\xafS\xd7 \xd2D\x06nIQ\x0e\xb1\xf3)\xbd\xaa\xa1\xf2\xadh\v\xd3l\xa7\x9c\x9f\xde(5\x9c_\xc3M\xbf(\xb4\xb8\x89e5q\xf4oI\xfd>\x8d\x19V?#\x95\xf3l\xd3\"?/t\x1aR9\xce\xc1\xaf/\xae\xd7\xd6a\xa01>', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000780)={0x0, 0x4000}) lsetxattr$security_capability(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='security.capability\x00', &(0x7f0000000740)=@v2={0x2000000, [{0xc75, 0x81}, {0x6, 0x8}]}, 0x14, 0x3) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2d70696473202d706964cb7c8dd77a2dd02b262fd3c8d01ff07320"], 0x1b) fallocate(r0, 0x11, 0x0, 0xc00000) 15:51:10 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000380)=0x9, 0x4) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r2, 0x7fffc) 15:51:10 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x40000}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:10 executing program 3: 15:51:10 executing program 4: ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000100)={0x1, "65676440fd3fa3e3f68fa9a13b469c7e3dd78e3805e1ed9463f4682b4efef141"}) 15:51:10 executing program 0: 15:51:10 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0xf0ffff}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:10 executing program 3: 15:51:10 executing program 4: r0 = syz_open_dev$video(0x0, 0x3, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000100)={0x1, "65676440fd3fa3e3f68fa9a13b469c7e3dd78e3805e1ed9463f4682b4efef141"}) 15:51:10 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$sock(r1, &(0x7f00000007c0)={&(0x7f0000000440)=@l2={0x1f, 0x5, {0xfffffffffffffffd, 0x7, 0x4, 0x3}, 0x9b1, 0x800}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000600)="dc1d02db38e73f1c09a4af9e2aa5fdbd606ecafe7c4c8041cf744f6308303b905fcd61a38497345aadfb6951bd24efeab3e2d57fe9ec7782d6c8278034d26e9b8be9b6344bd7aa66913dff2a4309c8369da1d99cc46e48d4dae710e5269f203628e37b21890d72935f77be01afd6fd91855138913b7ae0d6964e5de130e7da6210b7d89f1ee2586aa120326304df5c8addf5833a215ebfeea30b712693e5721a2268e5c20d4522331e0d41c57e3f41f00019cf3da4ab4ef00996ee5badae1f89f15d14ef259d2059f049c4102596302de2e841c4c1f2826a03537f26abe44fd0fcafc2b4be559ea1056b3220b089cae9", 0xf0}, {&(0x7f0000000500)="b72eca9e9f594c2bc352521fb892cd5be0c9dd9259e7e5b88434afa8ebc8b56395fc6d9762d4fa8b2fc9565ebe7b5982908f40a568c2b8e79c3c30e417a0f2a756e3c89f3e7ed065bdb81779e14da9dc9362fb99b40993f3c425082af56a5d5c0738f6925fd785aa115c7048be32279c1ead2fc4f9b223d19d06dcd9afb4a78f3486064ecd502b83b05e5362f864f6ad79d03828750a4db14b765c647f6004d982f50561629a5c58bb390f8d58a7b86441c7ef06e7aafe89d94a", 0xba}, {&(0x7f00000001c0)}, {&(0x7f0000001a00)="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", 0x1000}], 0x4, &(0x7f0000000700)=[@timestamping={{0x14, 0x1, 0x25, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0x40}}, @timestamping={{0x14, 0x1, 0x25, 0x418f}}, @timestamping={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x8000}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}], 0xa8}, 0x20000004) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) symlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x0) dup3(r0, r2, 0x7fffc) 15:51:10 executing program 0: 15:51:13 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)) ioctl$TIOCGPGRP(r1, 0x540f, 0x0) fcntl$getownex(r1, 0x10, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r4 = gettid() getpgrp(r4) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000005, 0x0) inotify_init1(0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 15:51:13 executing program 3: 15:51:13 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x1000000}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:13 executing program 4: r0 = syz_open_dev$video(0x0, 0x3, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000100)={0x1, "65676440fd3fa3e3f68fa9a13b469c7e3dd78e3805e1ed9463f4682b4efef141"}) 15:51:13 executing program 0: 15:51:13 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:51:13 executing program 3: 15:51:13 executing program 0: 15:51:13 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x2000000}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:13 executing program 4: r0 = syz_open_dev$video(0x0, 0x3, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000100)={0x1, "65676440fd3fa3e3f68fa9a13b469c7e3dd78e3805e1ed9463f4682b4efef141"}) 15:51:13 executing program 3: 15:51:13 executing program 0: 15:51:16 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x300004) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) readv(r0, &(0x7f0000000b40)=[{&(0x7f00000009c0)=""/54, 0x36}], 0x1) 15:51:16 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000100)={0x1, "65676440fd3fa3e3f68fa9a13b469c7e3dd78e3805e1ed9463f4682b4efef141"}) 15:51:16 executing program 2: mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='bpf\x00', 0x0, &(0x7f00000003c0)={[{@mode={'mode', 0x3d, 0x6455}}], [{@pcr={'pcr', 0x3d, 0xc}}]}) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:51:16 executing program 3: 15:51:16 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x3000000}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:16 executing program 0: 15:51:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040)=0xb37, 0x4) sendmsg(r1, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) 15:51:16 executing program 3: r0 = memfd_create(&(0x7f0000000ffd)='[,\x00', 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2012, r0, 0x0) mprotect(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x2) mprotect(&(0x7f0000004000/0x1000)=nil, 0x1000, 0xd) 15:51:16 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000100)={0x1, "65676440fd3fa3e3f68fa9a13b469c7e3dd78e3805e1ed9463f4682b4efef141"}) 15:51:16 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x4000000}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") [ 1779.633313][T23079] [ 1779.635711][T23079] ====================================================== [ 1779.642726][T23079] WARNING: possible circular locking dependency detected [ 1779.649923][T23079] 5.2.0-rc3-next-20190604 #8 Not tainted [ 1779.655563][T23079] ------------------------------------------------------ [ 1779.663297][T23079] syz-executor.3/23079 is trying to acquire lock: [ 1779.669811][T23079] 00000000e4a1a111 (&sb->s_type->i_mutex_key#12){+.+.}, at: process_measurement+0x9bc/0x15e0 [ 1779.680083][T23079] [ 1779.680083][T23079] but task is already holding lock: [ 1779.687968][T23079] 000000001803b460 (&mm->mmap_sem#2){++++}, at: do_mprotect_pkey+0x1f6/0xa30 [ 1779.696751][T23079] [ 1779.696751][T23079] which lock already depends on the new lock. [ 1779.696751][T23079] [ 1779.707270][T23079] [ 1779.707270][T23079] the existing dependency chain (in reverse order) is: [ 1779.713073][ T3881] kobject: 'loop4' (00000000668924f2): kobject_uevent_env [ 1779.716293][T23079] [ 1779.716293][T23079] -> #1 (&mm->mmap_sem#2){++++}: [ 1779.716323][T23079] down_read+0x3f/0x1e0 [ 1779.716346][T23079] __do_page_fault+0x9e9/0xda0 [ 1779.731268][ T3881] kobject: 'loop4' (00000000668924f2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1779.735632][T23079] do_page_fault+0x71/0x57d [ 1779.735646][T23079] page_fault+0x1e/0x30 [ 1779.735661][T23079] iov_iter_fault_in_readable+0x1ba/0x450 [ 1779.735672][T23079] generic_perform_write+0x186/0x520 [ 1779.735683][T23079] __generic_file_write_iter+0x25e/0x630 15:51:16 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x5000000}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:16 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000100)={0x1, "65676440fd3fa3e3f68fa9a13b469c7e3dd78e3805e1ed9463f4682b4efef141"}) [ 1779.735703][T23079] generic_file_write_iter+0x360/0x610 [ 1779.785574][T23079] new_sync_write+0x4d3/0x770 [ 1779.790787][T23079] __vfs_write+0xe1/0x110 [ 1779.797358][T23079] vfs_write+0x268/0x5d0 [ 1779.802143][T23079] ksys_write+0x14f/0x290 [ 1779.807004][T23079] __x64_sys_write+0x73/0xb0 [ 1779.812144][T23079] do_syscall_64+0xfd/0x680 [ 1779.817183][T23079] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1779.823591][T23079] [ 1779.823591][T23079] -> #0 (&sb->s_type->i_mutex_key#12){+.+.}: [ 1779.831859][T23079] lock_acquire+0x16f/0x3f0 [ 1779.836984][T23079] down_write+0x38/0xa0 [ 1779.841677][T23079] process_measurement+0x9bc/0x15e0 [ 1779.847412][T23079] ima_file_mmap+0x11a/0x130 [ 1779.852534][T23079] security_file_mprotect+0xd5/0x100 [ 1779.857294][ T3881] kobject: 'loop1' (0000000014b53b60): kobject_uevent_env [ 1779.858351][T23079] do_mprotect_pkey+0x537/0xa30 [ 1779.867498][ T3881] kobject: 'loop1' (0000000014b53b60): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1779.870910][T23079] __x64_sys_mprotect+0x78/0xb0 [ 1779.870925][T23079] do_syscall_64+0xfd/0x680 [ 1779.870940][T23079] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1779.870953][T23079] [ 1779.870953][T23079] other info that might help us debug this: [ 1779.870953][T23079] [ 1779.908142][T23079] Possible unsafe locking scenario: [ 1779.908142][T23079] [ 1779.915722][T23079] CPU0 CPU1 [ 1779.921088][T23079] ---- ---- [ 1779.926490][T23079] lock(&mm->mmap_sem#2); [ 1779.930907][T23079] lock(&sb->s_type->i_mutex_key#12); [ 1779.938962][T23079] lock(&mm->mmap_sem#2); [ 1779.945964][T23079] lock(&sb->s_type->i_mutex_key#12); [ 1779.951408][T23079] [ 1779.951408][T23079] *** DEADLOCK *** [ 1779.951408][T23079] [ 1779.959540][T23079] 1 lock held by syz-executor.3/23079: [ 1779.964972][T23079] #0: 000000001803b460 (&mm->mmap_sem#2){++++}, at: do_mprotect_pkey+0x1f6/0xa30 [ 1779.974235][T23079] [ 1779.974235][T23079] stack backtrace: [ 1779.980171][T23079] CPU: 0 PID: 23079 Comm: syz-executor.3 Not tainted 5.2.0-rc3-next-20190604 #8 [ 1779.989170][T23079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1779.999493][T23079] Call Trace: [ 1780.002771][T23079] dump_stack+0x172/0x1f0 [ 1780.007090][T23079] print_circular_bug.cold+0x1cc/0x28f [ 1780.012537][T23079] __lock_acquire+0x3755/0x5490 [ 1780.017409][T23079] ? ima_match_policy+0x9e9/0x13b0 [ 1780.022518][T23079] ? mark_held_locks+0xf0/0xf0 [ 1780.027301][T23079] ? ima_match_policy+0xa10/0x13b0 [ 1780.032409][T23079] lock_acquire+0x16f/0x3f0 [ 1780.036901][T23079] ? process_measurement+0x9bc/0x15e0 [ 1780.042271][T23079] down_write+0x38/0xa0 [ 1780.046449][T23079] ? process_measurement+0x9bc/0x15e0 [ 1780.051837][T23079] process_measurement+0x9bc/0x15e0 [ 1780.057029][T23079] ? aa_file_perm+0x40b/0xeb0 [ 1780.061697][T23079] ? mmap_violation_check+0x200/0x200 [ 1780.067052][T23079] ? mark_held_locks+0xf0/0xf0 [ 1780.071801][T23079] ? lock_downgrade+0x880/0x880 [ 1780.076734][T23079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1780.082966][T23079] ? kasan_check_read+0x11/0x20 [ 1780.087808][T23079] ? aa_get_task_label+0x3a6/0x720 [ 1780.093034][T23079] ? find_held_lock+0x35/0x130 [ 1780.097798][T23079] ? aa_get_task_label+0x3a6/0x720 [ 1780.103017][T23079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1780.109277][T23079] ? refcount_sub_and_test_checked+0x154/0x200 [ 1780.115424][T23079] ? refcount_dec_not_one+0x1f0/0x1f0 [ 1780.120789][T23079] ? refcount_dec_and_test_checked+0x1b/0x20 [ 1780.126773][T23079] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1780.133014][T23079] ? apparmor_task_getsecid+0x94/0xd0 [ 1780.138375][T23079] ima_file_mmap+0x11a/0x130 [ 1780.142980][T23079] ? ima_file_free+0x4a0/0x4a0 [ 1780.147754][T23079] security_file_mprotect+0xd5/0x100 [ 1780.153042][T23079] do_mprotect_pkey+0x537/0xa30 [ 1780.158080][T23079] ? mprotect_fixup+0xa70/0xa70 [ 1780.162931][T23079] ? do_syscall_64+0x26/0x680 [ 1780.167638][T23079] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1780.173705][T23079] ? do_syscall_64+0x26/0x680 [ 1780.178368][T23079] __x64_sys_mprotect+0x78/0xb0 [ 1780.183212][T23079] do_syscall_64+0xfd/0x680 [ 1780.187727][T23079] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1780.193612][T23079] RIP: 0033:0x459279 [ 1780.197519][T23079] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1780.217181][T23079] RSP: 002b:00007f29dadd4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 1780.225586][T23079] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 15:51:17 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='smaps_rollup\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') fchdir(r1) quotactl(0x2080000201, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f00000002c0)) 15:51:17 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x6000000}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:17 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400)='/dev/snapshot\x00', 0x200, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000340)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) getsockopt$bt_hci(r2, 0x0, 0x3, &(0x7f0000001a00)=""/4096, &(0x7f0000000380)=0x1000) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r3 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r3, 0x7fffc) open$dir(&(0x7f00000003c0)='./file0/file0\x00', 0x204001, 0x1a0) 15:51:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040)=0xb37, 0x4) sendmsg(r1, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) [ 1780.233559][T23079] RDX: 000000000000000d RSI: 0000000000001000 RDI: 0000000020004000 [ 1780.241514][T23079] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1780.249492][T23079] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f29dadd56d4 [ 1780.257465][T23079] R13: 00000000004c5d11 R14: 00000000004d9670 R15: 00000000ffffffff 15:51:17 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1008}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 1780.294890][ T3881] kobject: 'loop0' (000000006d3526e9): kobject_uevent_env [ 1780.302082][ T3881] kobject: 'loop0' (000000006d3526e9): fill_kobj_path: path = '/devices/virtual/block/loop0' 15:51:17 executing program 4: syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000100)={0x1, "65676440fd3fa3e3f68fa9a13b469c7e3dd78e3805e1ed9463f4682b4efef141"}) 15:51:17 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x7000000}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") [ 1780.387691][ T3881] kobject: 'loop2' (00000000e6efe75d): kobject_uevent_env [ 1780.429588][ T3881] kobject: 'loop2' (00000000e6efe75d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1780.489847][ T3881] kobject: 'loop4' (00000000668924f2): kobject_uevent_env [ 1780.508853][ T3881] kobject: 'loop4' (00000000668924f2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1780.545331][ T3881] kobject: 'loop1' (0000000014b53b60): kobject_uevent_env [ 1780.552546][ T3881] kobject: 'loop1' (0000000014b53b60): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1780.564331][ T3881] kobject: 'loop0' (000000006d3526e9): kobject_uevent_env [ 1780.571494][ T3881] kobject: 'loop0' (000000006d3526e9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1780.583210][ T3881] kobject: 'loop4' (00000000668924f2): kobject_uevent_env 15:51:17 executing program 3: r0 = memfd_create(&(0x7f0000000ffd)='[,\x00', 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2012, r0, 0x0) mprotect(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x2) mprotect(&(0x7f0000004000/0x1000)=nil, 0x1000, 0xd) 15:51:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040)=0xb37, 0x4) sendmsg(r1, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) 15:51:17 executing program 4: syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000100)={0x1, "65676440fd3fa3e3f68fa9a13b469c7e3dd78e3805e1ed9463f4682b4efef141"}) 15:51:17 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1008}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 15:51:17 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0xa000000}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") [ 1780.591446][ T3881] kobject: 'loop4' (00000000668924f2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1780.611564][ T3881] kobject: 'loop1' (0000000014b53b60): kobject_uevent_env 15:51:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040)=0xb37, 0x4) sendmsg(r1, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) 15:51:17 executing program 4: syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000100)={0x1, "65676440fd3fa3e3f68fa9a13b469c7e3dd78e3805e1ed9463f4682b4efef141"}) [ 1780.641062][ T3881] kobject: 'loop1' (0000000014b53b60): fill_kobj_path: path = '/devices/virtual/block/loop1' 15:51:17 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = accept$packet(0xffffffffffffff9c, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000540)=0x14) ioctl(r0, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', 0x0, 0x100003, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) lstat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_xen(&(0x7f00000002c0)='bpf\x00', &(0x7f0000000580)='./file0/file0\x00', &(0x7f0000000380)='9p\x00', 0x1, &(0x7f0000000900)={'trans=xen,', {[{@cache_fscache='cache=fscache'}, {@cachetag={'cachetag', 0x3d, 'trusted.overlay.nlink\x00'}}, {@afid={'afid', 0x3d, 0x2}}, {@dfltgid={'dfltgid', 0x3d, r2}}, {@aname={'aname', 0x3d, 'trusted.overlay.nlink\x00'}}, {@access_client='access=client'}, {@cache_none='cache=none'}, {@access_user='access=user'}]}}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r3 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r1, r3, 0x7fffc) [ 1780.688773][ T3881] kobject: 'loop3' (00000000f93b0b38): kobject_uevent_env [ 1780.714542][ T3881] kobject: 'loop3' (00000000f93b0b38): fill_kobj_path: path = '/devices/virtual/block/loop3' 15:51:17 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1008}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 15:51:17 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0xc000000}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:17 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, 0x0) [ 1780.799972][ T3881] kobject: 'loop1' (0000000014b53b60): kobject_uevent_env [ 1780.836436][ T3881] kobject: 'loop1' (0000000014b53b60): fill_kobj_path: path = '/devices/virtual/block/loop1' 15:51:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040)=0xb37, 0x4) recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) [ 1780.897538][ T3881] kobject: 'loop2' (00000000e6efe75d): kobject_uevent_env 15:51:18 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0xe000000}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:18 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1008}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 15:51:18 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, 0x0) [ 1780.940292][ T3881] kobject: 'loop2' (00000000e6efe75d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1780.995071][ T3881] kobject: 'loop3' (00000000f93b0b38): kobject_uevent_env [ 1781.021127][ T3881] kobject: 'loop3' (00000000f93b0b38): fill_kobj_path: path = '/devices/virtual/block/loop3' 15:51:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040)=0xb37, 0x4) recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) [ 1781.079656][ T3881] kobject: 'loop0' (000000006d3526e9): kobject_uevent_env [ 1781.079851][T23324] 9pnet: Could not find request transport: xen 15:51:18 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0xf000000}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:18 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, 0x0) 15:51:18 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1008}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 1781.120871][ T3881] kobject: 'loop0' (000000006d3526e9): fill_kobj_path: path = '/devices/virtual/block/loop0' 15:51:18 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x5533, 0x40900) ioctl$TIOCCONS(r1, 0x541d) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) r3 = dup3(r0, r2, 0x7fffc) ioctl$VIDIOC_S_FMT(r3, 0xc0d05605, &(0x7f0000000340)={0x5, @sliced={0x1, [0x5, 0x40000, 0xffffffffffffffff, 0xffffffffffff8000, 0xfffffffffffffff7, 0x9, 0x1, 0x20, 0x6, 0x4d, 0x7, 0x6, 0x0, 0xfd, 0x8, 0x6, 0x8, 0x9, 0x6, 0x58d6, 0x2, 0x0, 0x1, 0x6, 0x0, 0x9, 0x3f, 0x4, 0xffff, 0x6, 0x3, 0x20, 0xfcf8, 0xffff, 0x8, 0x100, 0x998, 0x1, 0x1000, 0x29d, 0x5, 0x6, 0x9, 0x488, 0x6, 0x0, 0x1, 0x5], 0x3f}}) 15:51:18 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1008}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 15:51:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040)=0xb37, 0x4) recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) 15:51:18 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000100)={0x0, "65676440fd3fa3e3f68fa9a13b469c7e3dd78e3805e1ed9463f4682b4efef141"}) [ 1781.181767][ T3881] kobject: 'loop1' (0000000014b53b60): kobject_uevent_env [ 1781.207065][ T3881] kobject: 'loop1' (0000000014b53b60): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1781.272038][ T3881] kobject: 'loop0' (000000006d3526e9): kobject_uevent_env 15:51:18 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x10000000}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") [ 1781.314484][ T3881] kobject: 'loop0' (000000006d3526e9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1781.362779][ T3881] kobject: 'loop3' (00000000f93b0b38): kobject_uevent_env 15:51:18 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000100)={0x0, "65676440fd3fa3e3f68fa9a13b469c7e3dd78e3805e1ed9463f4682b4efef141"}) 15:51:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r1 = socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) [ 1781.408979][ T3881] kobject: 'loop3' (00000000f93b0b38): fill_kobj_path: path = '/devices/virtual/block/loop3' 15:51:18 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000100)={0x0, "65676440fd3fa3e3f68fa9a13b469c7e3dd78e3805e1ed9463f4682b4efef141"}) 15:51:18 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1008}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 15:51:18 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x20000000}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") [ 1781.479874][ T3881] kobject: 'loop4' (00000000668924f2): kobject_uevent_env [ 1781.502961][ T3881] kobject: 'loop4' (00000000668924f2): fill_kobj_path: path = '/devices/virtual/block/loop4' 15:51:18 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1008}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 1781.540072][ T3881] kobject: 'loop0' (000000006d3526e9): kobject_uevent_env [ 1781.565917][ T3881] kobject: 'loop0' (000000006d3526e9): fill_kobj_path: path = '/devices/virtual/block/loop0' 15:51:18 executing program 4: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x400040002c2, 0x0) pwritev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="8041453ede36667dd71956942cc91bd92fe6359301341a2bf0d4e36a39d9568b3f76c8281b42553aa286004d3b1747e33384bc03ec7844b947618d4c2b8793c3567e8f1891b71aad932acad7887b3e3894d045620cca32afdfa54f", 0x5b}], 0x1, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x8, 0x0) [ 1781.595294][ T3881] kobject: 'loop4' (00000000668924f2): kobject_uevent_env [ 1781.609244][ T3881] kobject: 'loop4' (00000000668924f2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1781.649524][ T3881] kobject: 'loop2' (00000000e6efe75d): kobject_uevent_env [ 1781.671972][ T3881] kobject: 'loop2' (00000000e6efe75d): fill_kobj_path: path = '/devices/virtual/block/loop2' 15:51:18 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r1 = dup2(r0, r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x4e21, @empty}], 0x10) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/btrfs-control\x00', 0x220401, 0x0) ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f0000000380)={0x2, [0xa7, 0x8b5d]}) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r3 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r3, 0x7fffc) 15:51:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r1 = socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) 15:51:18 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x20000100}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:18 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1008}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 1781.703220][ T3881] kobject: 'loop1' (0000000014b53b60): kobject_uevent_env [ 1781.711999][ T3881] kobject: 'loop1' (0000000014b53b60): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1781.730051][ T3881] kobject: 'loop4' (00000000668924f2): kobject_uevent_env 15:51:18 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x3f000000}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") [ 1781.764337][ T3881] kobject: 'loop4' (00000000668924f2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1781.797221][ T3881] kobject: 'loop0' (000000006d3526e9): kobject_uevent_env 15:51:18 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:51:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r1 = socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) 15:51:18 executing program 4: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x400040002c2, 0x0) pwritev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="8041453ede36667dd71956942cc91bd92fe6359301341a2bf0d4e36a39d9568b3f76c8281b42553aa286004d3b1747e33384bc03ec7844b947618d4c2b8793c3567e8f1891b71aad932acad7887b3e3894d045620cca32afdfa54f", 0x5b}], 0x1, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x8, 0x0) [ 1781.835649][ T3881] kobject: 'loop0' (000000006d3526e9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1781.868396][ T3881] kobject: 'loop4' (00000000668924f2): kobject_uevent_env 15:51:19 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x40000000}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:19 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1008}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 1781.895336][ T3881] kobject: 'loop4' (00000000668924f2): fill_kobj_path: path = '/devices/virtual/block/loop4' 15:51:19 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) [ 1781.955627][ T3881] kobject: 'loop1' (0000000014b53b60): kobject_uevent_env [ 1781.962801][ T3881] kobject: 'loop1' (0000000014b53b60): fill_kobj_path: path = '/devices/virtual/block/loop1' 15:51:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000040)=0xb37, 0x4) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) [ 1782.019926][ T3881] kobject: 'loop0' (000000006d3526e9): kobject_uevent_env [ 1782.038801][ T3881] kobject: 'loop0' (000000006d3526e9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1782.081522][ T3881] kobject: 'loop4' (00000000668924f2): kobject_uevent_env 15:51:19 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$ASHMEM_GET_PROT_MASK(r2, 0x7706, &(0x7f00000003c0)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:51:19 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x48000000}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:19 executing program 5: r0 = socket(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1008}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 15:51:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000040)=0xb37, 0x4) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) 15:51:19 executing program 3: sendto(0xffffffffffffffff, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) [ 1782.127595][ T3881] kobject: 'loop4' (00000000668924f2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1782.155970][ T3881] kobject: 'loop2' (00000000e6efe75d): kobject_uevent_env 15:51:19 executing program 4: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x400040002c2, 0x0) pwritev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="8041453ede36667dd71956942cc91bd92fe6359301341a2bf0d4e36a39d9568b3f76c8281b42553aa286004d3b1747e33384bc03ec7844b947618d4c2b8793c3567e8f1891b71aad932acad7887b3e3894d045620cca32afdfa54f", 0x5b}], 0x1, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x8, 0x0) 15:51:19 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x4c000000}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") [ 1782.176746][ T3881] kobject: 'loop2' (00000000e6efe75d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1782.212572][ T3881] kobject: 'loop3' (00000000f93b0b38): kobject_uevent_env 15:51:19 executing program 3: sendto(0xffffffffffffffff, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) [ 1782.238320][ T3881] kobject: 'loop3' (00000000f93b0b38): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1782.268364][ T3881] kobject: 'loop0' (000000006d3526e9): kobject_uevent_env 15:51:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000040)=0xb37, 0x4) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) [ 1782.281562][ T3881] kobject: 'loop0' (000000006d3526e9): fill_kobj_path: path = '/devices/virtual/block/loop0' 15:51:19 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x60000000}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") [ 1782.311824][ T3881] kobject: 'loop4' (00000000668924f2): kobject_uevent_env 15:51:19 executing program 3: sendto(0xffffffffffffffff, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) 15:51:19 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xb37, 0x4) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) [ 1782.361637][ T3881] kobject: 'loop4' (00000000668924f2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1782.379054][ T3881] kobject: 'loop3' (00000000f93b0b38): kobject_uevent_env 15:51:19 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mknod(&(0x7f0000000340)='./file0\x00', 0x0, 0x9) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) socketpair(0x5, 0x800, 0x80000001, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) accept$alg(r1, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r2, 0x7fffc) 15:51:19 executing program 4: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x400040002c2, 0x0) pwritev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="8041453ede36667dd71956942cc91bd92fe6359301341a2bf0d4e36a39d9568b3f76c8281b42553aa286004d3b1747e33384bc03ec7844b947618d4c2b8793c3567e8f1891b71aad932acad7887b3e3894d045620cca32afdfa54f", 0x5b}], 0x1, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x8, 0x0) [ 1782.408070][ T3881] kobject: 'loop3' (00000000f93b0b38): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1782.450179][ T3881] kobject: 'loop0' (000000006d3526e9): kobject_uevent_env [ 1782.479336][ T3881] kobject: 'loop0' (000000006d3526e9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1782.520589][ T3881] kobject: 'loop1' (0000000014b53b60): kobject_uevent_env [ 1782.531582][ T3881] kobject: 'loop1' (0000000014b53b60): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1782.546197][ T3881] kobject: 'loop3' (00000000f93b0b38): kobject_uevent_env [ 1782.553475][ T3881] kobject: 'loop3' (00000000f93b0b38): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1782.569745][ T3881] kobject: 'loop0' (000000006d3526e9): kobject_uevent_env [ 1782.584036][ T3881] kobject: 'loop0' (000000006d3526e9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1782.608308][ T3881] kobject: 'loop4' (00000000668924f2): kobject_uevent_env [ 1782.620475][ T3881] kobject: 'loop4' (00000000668924f2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1782.632261][ T3881] kobject: 'loop1' (0000000014b53b60): kobject_uevent_env [ 1782.639696][ T3881] kobject: 'loop1' (0000000014b53b60): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1782.651235][ T3881] kobject: 'loop3' (00000000f93b0b38): kobject_uevent_env [ 1782.658571][ T3881] kobject: 'loop3' (00000000f93b0b38): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1782.669880][ T3881] kobject: 'loop0' (000000006d3526e9): kobject_uevent_env [ 1782.677090][ T3881] kobject: 'loop0' (000000006d3526e9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1782.689707][ T3881] kobject: 'loop1' (0000000014b53b60): kobject_uevent_env [ 1782.696906][ T3881] kobject: 'loop1' (0000000014b53b60): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1782.708234][ T3881] kobject: 'loop3' (00000000f93b0b38): kobject_uevent_env [ 1782.715438][ T3881] kobject: 'loop3' (00000000f93b0b38): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1782.727856][ T3881] kobject: 'loop0' (000000006d3526e9): kobject_uevent_env [ 1782.735079][ T3881] kobject: 'loop0' (000000006d3526e9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1782.746440][ T3881] kobject: 'loop4' (00000000668924f2): kobject_uevent_env [ 1782.753679][ T3881] kobject: 'loop4' (00000000668924f2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1782.768211][ T3881] kobject: 'loop3' (00000000f93b0b38): kobject_uevent_env [ 1782.776103][ T3881] kobject: 'loop3' (00000000f93b0b38): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1782.790710][ T3881] kobject: 'loop0' (000000006d3526e9): kobject_uevent_env [ 1782.798770][ T3881] kobject: 'loop0' (000000006d3526e9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1782.811475][ T3881] kobject: 'loop1' (0000000014b53b60): kobject_uevent_env [ 1782.818717][ T3881] kobject: 'loop1' (0000000014b53b60): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1782.830238][ T3881] kobject: 'loop4' (00000000668924f2): kobject_uevent_env [ 1782.837471][ T3881] kobject: 'loop4' (00000000668924f2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1782.848777][ T3881] kobject: 'loop2' (00000000e6efe75d): kobject_uevent_env [ 1782.855969][ T3881] kobject: 'loop2' (00000000e6efe75d): fill_kobj_path: path = '/devices/virtual/block/loop2' 15:51:20 executing program 5: r0 = socket(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1008}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 15:51:20 executing program 3: r0 = socket(0x0, 0x2, 0x0) sendto(r0, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) 15:51:20 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x65580000}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:20 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xb37, 0x4) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) 15:51:20 executing program 4: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x400040002c2, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x8, 0x0) 15:51:20 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffffffffffffc0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000340)={0x7, 0x7fff, 0x200, 0x81, 0xfffffffffffffffd, 0x8, 0xffffffff, 0x0, 0x0}, &(0x7f0000000380)=0x20) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000002a40)=ANY=[@ANYRES32=r2, @ANYBLOB="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"], 0x1008) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r3 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f00000003c0)=@req={0x6, 0x10001, 0x7f, 0x81}, 0x10) fsmount(r1, 0x1, 0x1) dup3(r0, r3, 0x7fffc) 15:51:20 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xb37, 0x4) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) 15:51:20 executing program 3: r0 = socket(0x0, 0x2, 0x0) sendto(r0, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) 15:51:20 executing program 4: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x400040002c2, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x8, 0x0) 15:51:20 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x68000000}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:20 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xb37, 0x4) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) 15:51:20 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x3a0, 0xfffffffffffffffd) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000380)='bpf\x00', 0x3, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f00000003c0)='/dev/dmmidi#\x00', 0xffff, 0x2000) setsockopt$bt_hci_HCI_DATA_DIR(r2, 0x0, 0x1, &(0x7f0000000400)=0x3, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) rmdir(&(0x7f0000000340)='./file0\x00') dup3(r0, r1, 0x7fffc) [ 1783.407892][ T3881] kobject: 'loop2' (00000000e6efe75d): kobject_uevent_env [ 1783.434585][ T3881] kobject: 'loop2' (00000000e6efe75d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1783.497843][ T3881] kobject: 'loop1' (0000000014b53b60): kobject_uevent_env [ 1783.538486][ T3881] kobject: 'loop1' (0000000014b53b60): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1783.572649][ T3881] kobject: 'loop4' (00000000668924f2): kobject_uevent_env [ 1783.588378][ T3881] kobject: 'loop4' (00000000668924f2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1783.727563][ T3881] kobject: 'loop2' (00000000e6efe75d): kobject_uevent_env [ 1783.737675][ T3881] kobject: 'loop2' (00000000e6efe75d): fill_kobj_path: path = '/devices/virtual/block/loop2' 15:51:20 executing program 5: r0 = socket(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1008}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 15:51:20 executing program 3: r0 = socket(0x0, 0x2, 0x0) sendto(r0, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) 15:51:20 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x6c000000}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:20 executing program 4: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x400040002c2, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x8, 0x0) 15:51:20 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xb37, 0x4) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) 15:51:20 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffffffffffff5b) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000500)='/dev/vcs#\x00', 0xffffffffffffffe1, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000540)={0x0}) pipe2(&(0x7f0000000580)={0xffffffffffffffff}, 0x84800) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000600)={r2, 0x0, r3}) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f0000000700)='./file1\x00', &(0x7f00000006c0)='bpf\x00', 0x0, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$capi20(r4, &(0x7f0000000480)={0x10, 0x80000001, 0x0, 0x81, 0x6, 0x30b}, 0x10) umount2(&(0x7f0000000800)='./file0\x00', 0x0) socket$can_raw(0x1d, 0x3, 0x1) r5 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(r5, &(0x7f0000000340)="59fcba7a1ef0c0915303dcaf758756de0efbefab42d543f2f9d3fe91b0b4735002fb76b89cd977be1d09c32781f71fcba6c356b8a2e4b29d37f6d7312d1eb58109a52da3c3d5ba897dd657f96e59e46fd96c07575ede9e50772013d3e7be988eb7a95dce68a735b1aaec4f3fa28b5f99c129c4cb647f7f67f007432304be0ebf3218c62dc769916f4e3f4b09e1abf257e3b4afefcce06d7f3146d1dcc59a9a22354b7c84c7e1288988416a2f730d2e860bb53ff458a6f6473b7d456507d785ff01eb", 0xc2) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r5, 0x7fffc) ioctl$EVIOCGUNIQ(r3, 0x80404508, &(0x7f00000005c0)=""/64) 15:51:21 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x74000000}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:21 executing program 3: r0 = socket(0x10, 0x0, 0x0) sendto(r0, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) 15:51:21 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xb37, 0x4) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) [ 1783.971017][ T3881] kobject: 'loop1' (0000000014b53b60): kobject_uevent_env [ 1783.989559][ T3881] kobject: 'loop1' (0000000014b53b60): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1784.034629][ T3881] kobject: 'loop3' (00000000f93b0b38): kobject_uevent_env 15:51:21 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000200)="8041453ede36667dd71956942cc91bd92fe6359301341a2bf0d4e36a39d9568b3f76c8281b42553aa286004d3b1747e33384bc03ec7844b947618d4c2b8793c3567e8f1891b71aad932acad7887b3e3894d045620cca32afdfa54f", 0x5b}], 0x1, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x8, 0x0) 15:51:21 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x7a000000}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:21 executing program 3: r0 = socket(0x10, 0x0, 0x0) sendto(r0, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) [ 1784.091847][ T3881] kobject: 'loop3' (00000000f93b0b38): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1784.129015][ T3881] kobject: 'loop0' (000000006d3526e9): kobject_uevent_env [ 1784.145379][ T3881] kobject: 'loop0' (000000006d3526e9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1784.198961][ T3881] kobject: 'loop1' (0000000014b53b60): kobject_uevent_env [ 1784.208782][ T3881] kobject: 'loop1' (0000000014b53b60): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1784.230869][ T3881] kobject: 'loop4' (00000000668924f2): kobject_uevent_env [ 1784.238384][ T3881] kobject: 'loop4' (00000000668924f2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1784.251101][ T3881] kobject: 'loop0' (000000006d3526e9): kobject_uevent_env [ 1784.260825][ T3881] kobject: 'loop0' (000000006d3526e9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1784.272796][ T3881] kobject: 'loop3' (00000000f93b0b38): kobject_uevent_env [ 1784.281171][ T3881] kobject: 'loop3' (00000000f93b0b38): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1784.292577][ T3881] kobject: 'loop4' (00000000668924f2): kobject_uevent_env [ 1784.299951][ T3881] kobject: 'loop4' (00000000668924f2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1784.311183][ T3881] kobject: 'loop1' (0000000014b53b60): kobject_uevent_env [ 1784.318345][ T3881] kobject: 'loop1' (0000000014b53b60): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1784.329520][ T3881] kobject: 'loop2' (00000000e6efe75d): kobject_uevent_env [ 1784.336699][ T3881] kobject: 'loop2' (00000000e6efe75d): fill_kobj_path: path = '/devices/virtual/block/loop2' 15:51:21 executing program 5: sendto(0xffffffffffffffff, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1008}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 15:51:21 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xb37, 0x4) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) 15:51:21 executing program 3: r0 = socket(0x10, 0x0, 0x0) sendto(r0, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) 15:51:21 executing program 2: r0 = accept4$x25(0xffffffffffffff9c, &(0x7f0000000340), &(0x7f0000000380)=0x12, 0x80000) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000400)=@add_del={0x2, &(0x7f00000003c0)='lapb0\x00'}) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r1, r2, 0x7fffc) 15:51:21 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000200)="8041453ede36667dd71956942cc91bd92fe6359301341a2bf0d4e36a39d9568b3f76c8281b42553aa286004d3b1747e33384bc03ec7844b947618d4c2b8793c3567e8f1891b71aad932acad7887b3e3894d045620cca32afdfa54f", 0x5b}], 0x1, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x8, 0x0) 15:51:21 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x7fffefd2}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:21 executing program 3: socket(0x10, 0x2, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) 15:51:21 executing program 5: sendto(0xffffffffffffffff, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1008}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 15:51:21 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x7fffefdc}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:21 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000200)="8041453ede36667dd71956942cc91bd92fe6359301341a2bf0d4e36a39d9568b3f76c8281b42553aa286004d3b1747e33384bc03ec7844b947618d4c2b8793c3567e8f1891b71aad932acad7887b3e3894d045620cca32afdfa54f", 0x5b}], 0x1, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x8, 0x0) 15:51:21 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xb37, 0x4) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) [ 1784.842885][ T3881] kobject: 'loop3' (00000000f93b0b38): kobject_uevent_env [ 1784.872823][ T3881] kobject: 'loop3' (00000000f93b0b38): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1784.921960][ T3881] kobject: 'loop0' (000000006d3526e9): kobject_uevent_env 15:51:22 executing program 3: socket(0x10, 0x2, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) 15:51:22 executing program 5: sendto(0xffffffffffffffff, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1008}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 1784.967424][ T3881] kobject: 'loop0' (000000006d3526e9): fill_kobj_path: path = '/devices/virtual/block/loop0' 15:51:22 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x81000000}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:22 executing program 4: r0 = open$dir(0x0, 0x400040002c2, 0x0) pwritev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="8041453ede36667dd71956942cc91bd92fe6359301341a2bf0d4e36a39d9568b3f76c8281b42553aa286004d3b1747e33384bc03ec7844b947618d4c2b8793c3567e8f1891b71aad932acad7887b3e3894d045620cca32afdfa54f", 0x5b}], 0x1, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x8, 0x0) [ 1785.031913][ T3881] kobject: 'loop1' (0000000014b53b60): kobject_uevent_env [ 1785.054917][ T3881] kobject: 'loop1' (0000000014b53b60): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1785.091631][ T3881] kobject: 'loop4' (00000000668924f2): kobject_uevent_env [ 1785.125883][ T3881] kobject: 'loop4' (00000000668924f2): fill_kobj_path: path = '/devices/virtual/block/loop4' 15:51:22 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f0000000340)='./file0/file0\x00', &(0x7f00000003c0)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) r2 = dup3(r0, r1, 0x80003) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000500)={@in={{0x2, 0x4e22, @multicast1}}, 0x0, 0x8, 0x0, "382949eedbbd3ae80ed8b2a57abeb325be1b6e2f8f84b8ed378694b70cfe04f2628e201133dd10f285b25dd7b1aa5fff13296b9dd2bdb7d31578753540505b94e3862d103f6ab1da83aecb6759da716c"}, 0xd8) 15:51:22 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0xb37, 0x4) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) 15:51:22 executing program 3: socket(0x10, 0x2, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) 15:51:22 executing program 4: r0 = open$dir(0x0, 0x400040002c2, 0x0) pwritev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="8041453ede36667dd71956942cc91bd92fe6359301341a2bf0d4e36a39d9568b3f76c8281b42553aa286004d3b1747e33384bc03ec7844b947618d4c2b8793c3567e8f1891b71aad932acad7887b3e3894d045620cca32afdfa54f", 0x5b}], 0x1, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x8, 0x0) 15:51:22 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x88a8ffff}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:22 executing program 5: r0 = socket(0x0, 0x2, 0x0) sendto(r0, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1008}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 1785.156711][ T3881] kobject: 'loop3' (00000000f93b0b38): kobject_uevent_env [ 1785.163879][ T3881] kobject: 'loop3' (00000000f93b0b38): fill_kobj_path: path = '/devices/virtual/block/loop3' 15:51:22 executing program 4: r0 = open$dir(0x0, 0x400040002c2, 0x0) pwritev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="8041453ede36667dd71956942cc91bd92fe6359301341a2bf0d4e36a39d9568b3f76c8281b42553aa286004d3b1747e33384bc03ec7844b947618d4c2b8793c3567e8f1891b71aad932acad7887b3e3894d045620cca32afdfa54f", 0x5b}], 0x1, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x8, 0x0) 15:51:22 executing program 5: r0 = socket(0x0, 0x2, 0x0) sendto(r0, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1008}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 15:51:22 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x9d190000}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") [ 1785.215417][ T3881] kobject: 'loop4' (00000000668924f2): kobject_uevent_env [ 1785.227525][ T3881] kobject: 'loop4' (00000000668924f2): fill_kobj_path: path = '/devices/virtual/block/loop4' 15:51:22 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:51:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="275a61635e0bcfec7be070") r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040)=0xb37, 0x4) sendmsg(r1, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) [ 1785.280739][ T3881] kobject: 'loop1' (0000000014b53b60): kobject_uevent_env [ 1785.303755][ T3881] kobject: 'loop1' (0000000014b53b60): fill_kobj_path: path = '/devices/virtual/block/loop1' 15:51:22 executing program 4: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) pwritev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="8041453ede36667dd71956942cc91bd92fe6359301341a2bf0d4e36a39d9568b3f76c8281b42553aa286004d3b1747e33384bc03ec7844b947618d4c2b8793c3567e8f1891b71aad932acad7887b3e3894d045620cca32afdfa54f", 0x5b}], 0x1, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x8, 0x0) [ 1785.347769][ T3881] kobject: 'loop3' (00000000f93b0b38): kobject_uevent_env [ 1785.375433][ T3881] kobject: 'loop3' (00000000f93b0b38): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1785.405489][ T3881] kobject: 'loop4' (00000000668924f2): kobject_uevent_env [ 1785.424977][ T3881] kobject: 'loop4' (00000000668924f2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1785.458872][ T3881] kobject: 'loop1' (0000000014b53b60): kobject_uevent_env [ 1785.475144][ T3881] kobject: 'loop1' (0000000014b53b60): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1785.497851][ T3881] kobject: 'loop2' (00000000e6efe75d): kobject_uevent_env [ 1785.513731][ T3881] kobject: 'loop2' (00000000e6efe75d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1785.532145][ T3881] kobject: 'loop4' (00000000668924f2): kobject_uevent_env [ 1785.539588][ T3881] kobject: 'loop4' (00000000668924f2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1785.551300][ T3881] kobject: 'loop3' (00000000f93b0b38): kobject_uevent_env 15:51:22 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='trusted.overlay.redirect\x00', &(0x7f00000003c0)='./file0\x00', 0x8, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:51:22 executing program 5: r0 = socket(0x0, 0x2, 0x0) sendto(r0, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1008}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 15:51:22 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:51:22 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0x9effffff}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:22 executing program 4: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) pwritev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="8041453ede36667dd71956942cc91bd92fe6359301341a2bf0d4e36a39d9568b3f76c8281b42553aa286004d3b1747e33384bc03ec7844b947618d4c2b8793c3567e8f1891b71aad932acad7887b3e3894d045620cca32afdfa54f", 0x5b}], 0x1, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x8, 0x0) 15:51:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="275a61635e0bcfec7be070") r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040)=0xb37, 0x4) sendmsg(r1, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) [ 1785.558520][ T3881] kobject: 'loop3' (00000000f93b0b38): fill_kobj_path: path = '/devices/virtual/block/loop3' 15:51:22 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:51:22 executing program 4: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) pwritev(r0, &(0x7f0000000280)=[{&(0x7f0000000200)="8041453ede36667dd71956942cc91bd92fe6359301341a2bf0d4e36a39d9568b3f76c8281b42553aa286004d3b1747e33384bc03ec7844b947618d4c2b8793c3567e8f1891b71aad932acad7887b3e3894d045620cca32afdfa54f", 0x5b}], 0x1, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x8, 0x0) 15:51:22 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0xc0000000}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:22 executing program 5: r0 = socket(0x10, 0x0, 0x0) sendto(r0, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1008}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 15:51:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="275a61635e0bcfec7be070") r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040)=0xb37, 0x4) sendmsg(r1, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) [ 1785.613823][ T3881] kobject: 'loop0' (000000006d3526e9): kobject_uevent_env [ 1785.640163][ T3881] kobject: 'loop0' (000000006d3526e9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1785.683765][ T3881] kobject: 'loop4' (00000000668924f2): kobject_uevent_env 15:51:22 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) [ 1785.727964][ T3881] kobject: 'loop4' (00000000668924f2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1785.787869][ T3881] kobject: 'loop3' (00000000f93b0b38): kobject_uevent_env [ 1785.807827][ T3881] kobject: 'loop3' (00000000f93b0b38): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1785.826585][ T3881] kobject: 'loop4' (00000000668924f2): kobject_uevent_env [ 1785.833807][ T3881] kobject: 'loop4' (00000000668924f2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1785.855670][ T3881] kobject: 'loop0' (000000006d3526e9): kobject_uevent_env [ 1785.863512][ T3881] kobject: 'loop0' (000000006d3526e9): fill_kobj_path: path = '/devices/virtual/block/loop0' 15:51:23 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0xc00e0000}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:23 executing program 5: r0 = socket(0x10, 0x0, 0x0) sendto(r0, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1008}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 15:51:23 executing program 4: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x400040002c2, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000200)="8041453ede36667dd71956942cc91bd92fe6359301341a2bf0d4e36a39d9568b3f76c8281b42553aa286004d3b1747e33384bc03ec7844b947618d4c2b8793c3567e8f1891b71aad932acad7887b3e3894d045620cca32afdfa54f", 0x5b}], 0x1, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x8, 0x0) 15:51:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040)=0xb37, 0x4) sendmsg(r1, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) 15:51:23 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r2) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:51:23 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) [ 1785.893065][ T3881] kobject: 'loop2' (00000000e6efe75d): kobject_uevent_env 15:51:23 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) 15:51:23 executing program 5: r0 = socket(0x10, 0x0, 0x0) sendto(r0, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1008}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 15:51:23 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0xd2efff7f}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") [ 1785.952133][ T3881] kobject: 'loop2' (00000000e6efe75d): fill_kobj_path: path = '/devices/virtual/block/loop2' 15:51:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040)=0xb37, 0x4) sendmsg(r1, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) [ 1786.005816][ T3881] kobject: 'loop3' (00000000f93b0b38): kobject_uevent_env [ 1786.013002][ T3881] kobject: 'loop3' (00000000f93b0b38): fill_kobj_path: path = '/devices/virtual/block/loop3' 15:51:23 executing program 4: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x400040002c2, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000200)="8041453ede36667dd71956942cc91bd92fe6359301341a2bf0d4e36a39d9568b3f76c8281b42553aa286004d3b1747e33384bc03ec7844b947618d4c2b8793c3567e8f1891b71aad932acad7887b3e3894d045620cca32afdfa54f", 0x5b}], 0x1, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x8, 0x0) 15:51:23 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000180)="120000001200e7ef0d", 0x9, 0x0, 0x0, 0x0) [ 1786.053769][ T3881] kobject: 'loop1' (0000000014b53b60): kobject_uevent_env [ 1786.078342][ T3881] kobject: 'loop1' (0000000014b53b60): fill_kobj_path: path = '/devices/virtual/block/loop1' 15:51:23 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0xdcefff7f}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 15:51:23 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1008}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 1786.139894][ T3881] kobject: 'loop0' (000000006d3526e9): kobject_uevent_env [ 1786.169122][ T3881] kobject: 'loop0' (000000006d3526e9): fill_kobj_path: path = '/devices/virtual/block/loop0' 15:51:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040)=0xb37, 0x4) sendmsg(r1, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) 15:51:23 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000180)="120000001200e7ef0d", 0x9, 0x0, 0x0, 0x0) 15:51:23 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) close(r0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000340)='/dev/snapshot\x00', 0x84440, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000380)=[@in6={0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, [], 0x10}, 0x100}, @in={0x2, 0x4e22, @multicast1}, @in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e21, 0x0, @mcast2, 0x401}, @in6={0xa, 0x4e22, 0x1b9, @loopback, 0x9}, @in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e24, 0xfffffffffffffffa, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x26}}], 0xb0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) dup3(r0, r1, 0x7fffc) 15:51:23 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0xe03f0300}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") [ 1786.229351][ T3881] kobject: 'loop3' (00000000f93b0b38): kobject_uevent_env [ 1786.252335][ T3881] kobject: 'loop3' (00000000f93b0b38): fill_kobj_path: path = '/devices/virtual/block/loop3' 15:51:23 executing program 4: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x400040002c2, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000200)="8041453ede36667dd71956942cc91bd92fe6359301341a2bf0d4e36a39d9568b3f76c8281b42553aa286004d3b1747e33384bc03ec7844b947618d4c2b8793c3567e8f1891b71aad932acad7887b3e3894d045620cca32afdfa54f", 0x5b}], 0x1, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x8, 0x0) 15:51:23 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000180)="120000001200e7ef0d", 0x9, 0x0, 0x0, 0x0) 15:51:23 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0xeffdffff}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") [ 1786.287404][ T3881] kobject: 'loop1' (0000000014b53b60): kobject_uevent_env [ 1786.315897][ T3881] kobject: 'loop1' (0000000014b53b60): fill_kobj_path: path = '/devices/virtual/block/loop1' 15:51:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040)=0xb37, 0x4) sendmsg(r1, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) 15:51:23 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00", 0xe, 0x0, 0x0, 0x0) [ 1786.340799][ T3881] kobject: 'loop0' (000000006d3526e9): kobject_uevent_env [ 1786.366589][ T3881] kobject: 'loop0' (000000006d3526e9): fill_kobj_path: path = '/devices/virtual/block/loop0' 15:51:23 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080003, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100), 0xf0ffffff}], 0x492492492492805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") [ 1786.409649][ T3881] kobject: 'loop3' (00000000f93b0b38): kobject_uevent_env [ 1786.435813][ T3881] kobject: 'loop3' (00000000f93b0b38): fill_kobj_path: path = '/devices/virtual/block/loop3' 15:51:23 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00", 0xe, 0x0, 0x0, 0x0) [ 1786.463477][ T3881] kobject: 'loop2' (00000000e6efe75d): kobject_uevent_env [ 1786.489297][ T3881] kobject: 'loop2' (00000000e6efe75d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1786.539940][ T3881] kobject: 'loop1' (0000000014b53b60): kobject_uevent_env [ 1786.555122][ T3881] kobject: 'loop1' (0000000014b53b60): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1786.573488][ T3881] kobject: 'loop0' (000000006d3526e9): kobject_uevent_env [ 1786.585897][ T3881] kobject: 'loop0' (000000006d3526e9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1786.598052][ T3881] kobject: 'loop1' (0000000014b53b60): kobject_uevent_env [ 1786.605848][ T3881] kobject: 'loop1' (0000000014b53b60): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1786.617806][ T3881] kobject: 'loop4' (00000000668924f2): kobject_uevent_env [ 1786.625713][ T3881] kobject: 'loop4' (00000000668924f2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1786.637041][ T3881] kobject: 'loop0' (000000006d3526e9): kobject_uevent_env [ 1786.644316][ T3881] kobject: 'loop0' (000000006d3526e9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1786.655757][ T3881] kobject: 'loop1' (0000000014b53b60): kobject_uevent_env [ 1786.662897][ T3881] kobject: 'loop1' (0000000014b53b60): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1786.674483][ T3881] kobject: 'loop2' (00000000e6efe75d): kobject_uevent_env [ 1786.681650][ T3881] kobject: 'loop2' (00000000e6efe75d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1786.693912][ T3881] kobject: 'loop4' (00000000668924f2): kobject_uevent_env [ 1786.701084][ T3881] kobject: 'loop4' (00000000668924f2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1786.712352][ T3881] kobject: 'loop1' (0000000014b53b60): kobject_uevent_env [ 1786.719612][ T3881] kobject: 'loop1' (0000000014b53b60): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1786.730928][ T3881] kobject: 'loop0' (000000006d3526e9): kobject_uevent_env [ 1786.738136][ T3881] kobject: 'loop0' (000000006d3526e9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1786.750605][ T3881] kobject: 'loop1' (0000000014b53b60): kobject_uevent_env [ 1786.758995][ T3881] kobject: 'loop1' (0000000014b53b60): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1786.770862][ T3881] kobject: 'loop0' (000000006d3526e9): kobject_uevent_env [ 1786.779163][ T3881] kobject: 'loop0' (000000006d3526e9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1786.790419][ T3881] kobject: 'loop3' (00000000f93b0b38): kobject_uevent_env [ 1786.797634][ T3881] kobject: 'loop3' (00000000f93b0b38): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1786.808906][ T3881] kobject: 'loop2' (00000000e6efe75d): kobject_uevent_env [ 1786.816081][ T3881] kobject: 'loop2' (00000000e6efe75d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1786.827390][ T3881] kobject: 'loop1' (0000000014b53b60): kobject_uevent_env [ 1786.834593][ T3881] kobject: 'loop1' (0000000014b53b60): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1786.846239][ T3881] kobject: 'loop3' (00000000f93b0b38): kobject_uevent_env [ 1786.853719][ T3881] kobject: 'loop3' (00000000f93b0b38): fill_kobj_path: path = '/devices/virtual/block/loop3' 15:51:24 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000180)="120000001200e7ef0d001a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1008}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 15:51:24 executing program 4: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x400040002c2, 0x0) pwritev(r0, 0x0, 0x0, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x8, 0x0) 15:51:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040)=0xb37, 0x4) sendmsg(r1, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x400009c, 0x2040, 0x0) 15:51:24 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = dup(0xffffffffffffff9c) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000540)=0x4434, 0x4) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) modify_ldt$read_default(0x2, &(0x7f0000000640)=""/25, 0x19) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x80000, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000400)='/dev/hwrng\x00', 0x10101, 0x0) r3 = syz_open_dev$cec(&(0x7f0000000440)='/dev/cec#\x00', 0x1, 0x2) ioctl$KVM_HYPERV_EVENTFD(r2, 0x4018aebd, &(0x7f0000000480)={0x3, r3, 0x1}) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) write$binfmt_misc(r1, &(0x7f0000000380)={'syz1', "75e73d8bb7d67aabe47122bf10fec0f2e07e64d4c5"}, 0x19) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000500)='./file0/file0\x00', 0x0) r4 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x1, 0x0, 0x0, 0x0, 0x89f, 0x8, 0x0, 0x0, 0x3, 0x7, 0x2, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r4, 0x80087601, &(0x7f00000003c0)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f000