t$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:01 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<'}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:03:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000070000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:02 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500600000000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:02 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8, 0x208000) ioctl$TIOCGSERIAL(r1, 0x541e, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/188}) semop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffffe}], 0x1) tkill(r0, 0x1000000000015) 02:03:02 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffffe}], 0x1) tkill(r0, 0x1000000000015) [ 537.526520] IPVS: ftp: loaded support on port[0] = 21 [ 537.539637] IPVS: ftp: loaded support on port[0] = 21 02:03:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000a0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:02 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500680000000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:02 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x200100, 0x0) bind$tipc(r0, &(0x7f0000000080)=@id={0x1e, 0x3, 0x1, {0x4e24, 0x1}}, 0x10) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000000040)={0x7f, 0x3, 0x5, 0x1}) r1 = gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f0000000880)={{}, {r2, r3+30000000}}, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffffe}], 0x1) tkill(r1, 0x1000000000015) 02:03:02 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffffe}], 0x1) tkill(r0, 0x1000000000015) 02:03:02 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305006c0000000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000010c0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:03 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000000c0)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:03 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500740000000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:03 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffffe}], 0x1) tkill(r0, 0x1000000000015) 02:03:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000e0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:03 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<'}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:03:03 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305007a0000000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000f0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:03 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffffe}], 0x1) tkill(r0, 0x1000000000015) 02:03:03 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500e40000000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000200000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:03 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, 0x0, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffffe}], 0x1) tkill(r0, 0x1000000000015) 02:03:03 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500f00000000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:05 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:05 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000003f0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:05 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000300000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:05 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<'}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) [ 540.995837] nla_parse: 22 callbacks suppressed [ 540.995848] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 541.022198] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:03:05 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000480000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 541.046690] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:03:05 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000500000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:05 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000600000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:05 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000004c0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 541.163222] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 541.164381] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 541.193597] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:03:05 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000600000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 541.282538] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 541.319537] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:03:06 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000700000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 541.354250] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 541.376712] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:03:06 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, 0x0, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffffe}], 0x1) tkill(r0, 0x1000000000015) 02:03:06 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000680000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:07 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000006c0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:07 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000a00000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:07 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffffe}], 0x1) socket$caif_stream(0x25, 0x1, 0x0) tkill(r0, 0x1000000000015) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x20) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000100)=r2, 0x4) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000080)={0x0, r1, 0x771c00000000000}) 02:03:07 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:07 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:08 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000e00000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:08 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000740000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:08 executing program 1: gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) chdir(&(0x7f0000000000)='./file0\x00') semop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffffe}], 0x1) tkill(0x0, 0x2000000c) [ 543.501158] IPVS: ftp: loaded support on port[0] = 21 02:03:08 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500c00e00000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:08 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000007a0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 543.860891] IPVS: ftp: loaded support on port[0] = 21 02:03:09 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000f00000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:09 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffffe}], 0x1) tkill(r0, 0x1000000000015) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x18, 0x4, 0x7, 0x203, 0x0, 0x0, {}, [@nested={0xffffffffffffff2f, 0x7}]}, 0x18}}, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000000)=0xf, 0x4) 02:03:09 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, 0x0, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffffe}], 0x1) tkill(r0, 0x1000000000015) 02:03:09 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500ffffff9e0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:09 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:09 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:09 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000ec00000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:09 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500002000000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:09 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000880)={{r1, r2+30000000}, {r3, r4+30000000}}, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffffe}], 0x1) tkill(r0, 0x2000019) r5 = gettid() tkill(r5, 0x1002000000013) ptrace$getregset(0x4204, r5, 0xc, &(0x7f0000000000)={&(0x7f00000008c0)=""/4096, 0x1000}) 02:03:10 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500fffffff00000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:10 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500003f00000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:10 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000f0ffff0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:10 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500004000000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:10 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305007fffffff0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 546.018447] IPVS: ftp: loaded support on port[0] = 21 02:03:12 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) semop(0x0, 0x0, 0x0) tkill(r0, 0x1000000000015) 02:03:12 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500004800000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305009effffff0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:12 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:12 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) [ 548.281836] nla_parse: 26 callbacks suppressed [ 548.281847] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 548.305104] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 548.307427] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:03:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500f0ffffff0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:13 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500004c00000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:13 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) semop(0x0, 0x0, 0x0) tkill(r0, 0x1000000000015) 02:03:13 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffffe}], 0x1) tkill(r0, 0x1000000000015) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0x1, 0x4, 0xe0, 0xe1, 0x1, 0x1}, 0x5b}, 0xa) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000)=0x66dd, 0x4) 02:03:13 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) semop(0x0, 0x0, 0x0) tkill(r0, 0x1000000000015) [ 548.490428] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 548.501961] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 548.504552] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:03:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000003400000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:13 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500006000000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:13 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffffe}], 0x1) set_tid_address(&(0x7f0000000080)) tkill(r0, 0x1000000000015) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0x101000) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040)={0x1b}, 0x1) 02:03:13 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) semop(0x0, &(0x7f00000000c0), 0x0) tkill(r0, 0x1000000000015) [ 548.703052] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 548.704986] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:03:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500fffffffffffff00000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 548.785002] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 548.901519] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:03:14 executing program 1: r0 = gettid() getpgid(0x0) timer_create(0x0, &(0x7f0000000340)={0x0, 0x31, 0x0, @thr={&(0x7f0000000100)="3d922b5d7feae39f2db1f76e69d2fb13ba9e9553b464e74a624acb79bcca7309b386be9d23c2f6848736ba718f436389b9efc430a00a56a065306792da6888e14404765d01974ef6b48d9579d9d8094c97fd32dead6c6bc52769f09660a12f00534fd518d1f4a0b1de6b6db2b24dd684e34ae5751f1aaa58a469f9e9834110c43ebe26d71ea13d336f248840271d1ac292d9e7cda278e4f9ee77edf25c01313950e2e2cee0fdba53058946ebcfb4c6ae79299f5072da87953427baa0ebb2dabfd6accaaaed96934c9c9f8e3bd3b922754e474c9354887add03ef4bad06f7a73aa6dc30144e1055e76201b8a6c3e007731bb0b69f", &(0x7f0000000240)="02abab4cb17a8d077b2759e28d1b0f8e42e341536c0fac091c982ce7c635106f9afea10cd75de7b777944c23717517754064dc228f6d91505f4fd7fab2f850ab65a7cb79ee92d2888039fbff69da2fd865db40e09903ee2db713b07496f55437b48ef5f4af518d18e3b25f1d8b22ba74ad9c9c47398fb18c6613d2009290243b7cb6ddb145b0a7cce4d63f46e3e21b37439ef27693411e"}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) semop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffffe}], 0x1) tkill(r0, 0x1000000000015) 02:03:14 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500006800000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:14 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) semop(0x0, &(0x7f00000000c0), 0x0) tkill(r0, 0x1000000000015) 02:03:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000100000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:14 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:03:14 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:14 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500006c00000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:14 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) semop(0x0, &(0x7f00000000c0), 0x0) tkill(r0, 0x1000000000015) 02:03:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000200000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:14 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_EPOCH_READ(r2, 0x8008700d, &(0x7f0000000000)) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') semop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffffe}], 0x1) tkill(r0, 0x1000000000015) [ 549.962542] IPVS: ftp: loaded support on port[0] = 21 02:03:14 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500007400000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:14 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)=0x0) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[], 0x37, 0x400, 0x377dc7ed, 0x9, 0xfff, r0}) semop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffffe}], 0x1) tkill(r0, 0x17) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000280)="4bcbff389f629fb6f1d8b95f44a7a806bf8e54367b6f4b5e8155b0b91901b0ac2e61c0cd65938d3a88ae7515ca4affd8734bb34c611a261bbfe48c8a9e3b3ebf5b563f44383cc9d4099b", 0x4a) r4 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xfffffffffffffffe, 0x80000) ioctl$SIOCX25GCALLUSERDATA(r4, 0x89e4, &(0x7f0000000100)={0x40, "a50500b63794d2b7cfb8b2482107ff5c84b5c249d5cc41ceb2fe8f0073886363c190537a0a0814071b878a6ef6f09dd8b461f7a4d8310b3ab99ccc0cec040f287a5c1d8458a3975b880a9b26015126373f4371bc0f9da5b540ee2188a9bb73b1d360be76f01fe4a2c18ec528042407b1d023edd9788f971e101749193ec1e215"}) timer_settime(r1, 0x1, &(0x7f00000001c0)={{}, {0x0, 0x989680}}, &(0x7f0000000240)) 02:03:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000300000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:14 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) semop(0x0, &(0x7f00000000c0)=[{}], 0x1) tkill(r0, 0x1000000000015) 02:03:14 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500007a00000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:14 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffffe}], 0x1) socket$nl_xfrm(0x10, 0x3, 0x6) tkill(r0, 0x1000000000015) [ 550.562475] IPVS: ftp: loaded support on port[0] = 21 02:03:15 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:03:15 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) semop(0x0, &(0x7f00000000c0)=[{}], 0x1) tkill(r0, 0x1000000000015) 02:03:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000400000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:15 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000ec000000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:15 executing program 1: r0 = gettid() r1 = gettid() tkill(r1, 0x1002000000013) timer_create(0x4, &(0x7f0000000380)={0x0, 0x1d, 0x0, @thr={&(0x7f0000000240)="51eadd2c5d7b331273e2580f81dac4b204eef8275f50c5ed303cab609316fa86fcffffffffffffff3ecc5448544aa4a1679f823d16a4f1281001c643823afcc01cfe90e3a4f6b35b45eb76dde3e967dd3604e32968b9ad9dde3d9b9749b28b94d2113bb3f501fb220c58af0600b32054603936775009b660d7b6c1404b929dc15cec30ca8611669039c953dd7441e0b2702ab7606d40d92e00327a1eb53b2f251bd5bd507a508097e12d502bce330c2574914e48fba725b1dcf59de13e3e251135053fc968437c5e0dd45d030c6f90b64f3e96c26c53707c6e9eaa07eab9c1aaeb", &(0x7f0000000180)="603d618c5a4f07ccf70d0a27355a9bf38c212d00c80b625d053469151acde3d92c987f7e64f24a50653040e48790589d160af6820a0da203a338c4aaad61787d729e82e74f018931e986aaf5ac62683b5b26c78d4daa4bc219290a0f55024c4b5b4f881ac655d6629d8084"}}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x4001) ioctl$SCSI_IOCTL_DOORUNLOCK(r2, 0x5381) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000500)='/proc/self\x00', 0x4400, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='I@VS\x00') sendmsg$IPVS_CMD_GET_DEST(r4, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x240020}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)={0xe4, r5, 0x4, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xff}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x512}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6a6d}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7fff}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x200}, @IPVS_CMD_ATTR_SERVICE={0x74, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@rand_addr="cc4842dbdb827c24617b1c71f66fc113"}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1bc0ba01fb26fdc, 0x25}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x28, 0x4}}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x4000000}, 0x24044801) semop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffffe}], 0x1) r6 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TIOCLINUX3(r6, 0x541c, &(0x7f00000004c0)) tkill(r0, 0x1000000000015) 02:03:15 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000500000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:15 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000e400000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:15 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) semop(0x0, &(0x7f00000000c0)=[{}], 0x1) tkill(r0, 0x1000000000015) 02:03:15 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000f000000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000600000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:15 executing program 2: gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffffe}], 0x1) tkill(0x0, 0x1000000000015) 02:03:16 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:03:16 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500004003000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000700000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:16 executing program 2: gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffffe}], 0x1) tkill(0x0, 0x1000000000015) 02:03:18 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) capget(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)={0x8, 0x9, 0x7fff, 0x80000001, 0x2, 0x7}) r1 = gettid() tkill(r1, 0x1002000000013) r2 = socket$unix(0x1, 0x5, 0x0) ftruncate(r2, 0xfb) timer_create(0x4, &(0x7f0000000080)={0x0, 0x40, 0x4, @tid=r1}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) semop(0x0, &(0x7f00000000c0), 0x0) tkill(r0, 0x1000000000015) 02:03:18 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000a00000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:18 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000340000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:18 executing program 2: gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffffe}], 0x1) tkill(0x0, 0x1000000000015) [ 553.770790] nla_parse: 21 callbacks suppressed [ 553.770801] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 553.773307] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:03:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000010c00000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:18 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500fffff0000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 553.826427] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:03:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000e00000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 553.908013] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 553.930119] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 554.012464] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 554.154363] IPVS: ftp: loaded support on port[0] = 21 02:03:18 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000010000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:18 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:03:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000f00000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:19 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000002000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 554.337675] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 554.352288] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 554.382495] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 554.443607] IPVS: ftp: loaded support on port[0] = 21 [ 554.472199] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:03:21 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffffe}], 0x1) tkill(r0, 0x1000000000015) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xffffffff80000001, 0x2780) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000040)) 02:03:21 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000020000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000003f00000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:21 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffffe}], 0x1) tkill(r0, 0x0) 02:03:21 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:21 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:03:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000004800000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:21 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000030000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:21 executing program 1: 02:03:21 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000040000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000004c00000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:21 executing program 1: 02:03:21 executing program 1: 02:03:21 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000050000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000006000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:22 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffffe}], 0x1) tkill(r0, 0x0) 02:03:22 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:22 executing program 1: 02:03:22 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000060000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000006800000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:22 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:03:22 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000070000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000006c00000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:23 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0xd) r3 = openat$cgroup_procs(r2, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f0000000000)=0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={r5}, 0xc) write$cgroup_pid(r3, &(0x7f0000000580)=r5, 0x12) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfffffcbe) ioctl$EXT4_IOC_SWAP_BOOT(r6, 0x6611) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000200)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r7}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r5, r6, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r7}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r0, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r7}, 0x30) r8 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={r7}, 0xc) fstat(r8, &(0x7f0000000400)) accept(0xffffffffffffffff, &(0x7f00000000c0)=@generic, &(0x7f0000000000)=0x80) r9 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r10 = ioctl$KVM_CREATE_VM(r9, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r10, 0xae60) r11 = ioctl$KVM_CREATE_VCPU(r10, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r10, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r11, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r11, 0xae80, 0x0) ioctl$KVM_RUN(r11, 0xae80, 0x0) 02:03:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000007400000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:23 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000a0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:23 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffffe}], 0x1) tkill(r0, 0x0) [ 558.568141] IPVS: ftp: loaded support on port[0] = 21 02:03:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000007a00000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 558.817277] nla_parse: 18 callbacks suppressed [ 558.817322] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 558.846203] IPVS: ftp: loaded support on port[0] = 21 [ 559.032572] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:03:24 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:24 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:24 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000e0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000ffffff9e00000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x201000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000ad6fad)='\x00', 0x1, 0x3fffffd, 0x0, 0xa02) recvfrom$inet6(r1, 0x0, 0x0, 0x1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) 02:03:24 executing program 2: syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x100) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000270700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xb}, 0x10}, 0x70) exit(0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYRESHEX], 0x2216) [ 559.675986] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 559.695981] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 559.708772] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:03:24 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x4) 02:03:24 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000f0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000000ec000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000fffffff000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 559.872125] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 559.878476] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 559.933539] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:03:24 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000200000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000007fffffff00000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 559.979559] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 560.077804] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:03:26 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:26 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:26 executing program 1: creat(&(0x7f0000000200)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 02:03:26 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000003f0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000ffffffff00000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) creat(&(0x7f0000000100)='./bus\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@mcast2, @in=@empty}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) creat(&(0x7f00000002c0)='./bus\x00', 0x0) io_submit(0x0, 0x0, &(0x7f0000000540)) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000740)={0x0, {{0x2, 0x0, @multicast2}}, 0x0, 0x2, [{{0x2, 0x0, @dev}}, {{0x2, 0x0, @loopback}}]}, 0x18c) creat(0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100bf, 0x0, 0x0, 0x0, 0x4000000000, 0x4, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmmsg(r3, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) 02:03:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000f0ffffffffffff00000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:26 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000400000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000200000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 561.722562] IPVS: ftp: loaded support on port[0] = 21 02:03:26 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000480000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000300000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:26 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000004c0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 562.215648] IPVS: ftp: loaded support on port[0] = 21 02:03:27 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000600000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:28 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:28 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuacct.usage_sys\x00', 0x275a, 0x0) fallocate(r0, 0x8, 0x0, 0x110000) 02:03:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000400000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x1ff) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000180)='./file0\x00') mkdirat(r0, &(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) keyctl$get_security(0x11, 0x0, &(0x7f0000000280)=""/27, 0x1b) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.stat\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r3, &(0x7f0000000440)={&(0x7f0000000100), 0xc, 0x0}, 0xc490d273bf9eb065) sendmmsg(0xffffffffffffffff, 0x0, 0xd3, 0x0) 02:03:28 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:28 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000680000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:28 executing program 2: creat(&(0x7f0000000200)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@known='user.syz\x00') [ 563.884132] nla_parse: 15 callbacks suppressed [ 563.884142] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 563.903239] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:03:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000500000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:28 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000006c0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 564.052537] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 564.076244] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:03:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000600000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:28 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000740000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 564.115519] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:03:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000700000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 564.188445] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 564.224133] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 564.242205] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 564.284745] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:03:30 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:30 executing program 2: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff0b1) prctl$PR_SET_ENDIAN(0x1e, 0x0) 02:03:30 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000007a0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000a00000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:30 executing program 1: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff0ae) prctl$PR_SET_ENDIAN(0x1e, 0x0) 02:03:30 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:03:30 executing program 1: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff0ad) prctl$PR_SET_ENDIAN(0x1e, 0x0) [ 565.669368] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:03:30 executing program 2: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff7fa) prctl$PR_SET_ENDIAN(0x1e, 0x0) 02:03:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000e00000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:30 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500ffffff9e0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:30 executing program 1: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffffbd9) prctl$PR_SET_ENDIAN(0x1e, 0x0) [ 565.874907] IPVS: ftp: loaded support on port[0] = 21 02:03:30 executing program 2: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff2a2) prctl$PR_SET_ENDIAN(0x1e, 0x0) [ 566.219965] IPVS: ftp: loaded support on port[0] = 21 02:03:31 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000ec00000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000f00000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:31 executing program 2: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff0b2) prctl$PR_SET_ENDIAN(0x1e, 0x0) 02:03:31 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:31 executing program 1: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff2a6) prctl$PR_SET_ENDIAN(0x1e, 0x0) 02:03:31 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:03:31 executing program 1: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffffa55) prctl$PR_SET_ENDIAN(0x1e, 0x0) 02:03:31 executing program 2: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff0aa) prctl$PR_SET_ENDIAN(0x1e, 0x0) 02:03:31 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000e40000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500004800000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:31 executing program 2: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff0a4) prctl$PR_SET_ENDIAN(0x1e, 0x0) 02:03:31 executing program 1: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff0a2) prctl$PR_SET_ENDIAN(0x1e, 0x0) 02:03:31 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500fffffff00000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500004c00000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:31 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000b, &(0x7f0000000040)=0x8000000010000006, 0x4) socket$inet_udp(0x2, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) creat(0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffefa, 0xfffffefffffffffe, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000001940)=[{{0x0, 0x0, &(0x7f0000001880)=[{0x0}, {&(0x7f0000001780)="e0c88c", 0x3}], 0x2}}], 0x1, 0x4008000) close(r0) 02:03:32 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:32 executing program 1: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff0a1) prctl$PR_SET_ENDIAN(0x1e, 0x0) 02:03:32 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500006000000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:32 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000f0ffff0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:32 executing program 2: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff3d0) prctl$PR_SET_ENDIAN(0x1e, 0x0) 02:03:32 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:03:32 executing program 2: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff0ac) prctl$PR_SET_ENDIAN(0x1e, 0x0) 02:03:32 executing program 1: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff4b9) prctl$PR_SET_ENDIAN(0x1e, 0x0) 02:03:32 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500006800000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:32 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305007fffffff0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:33 executing program 2: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff403) prctl$PR_SET_ENDIAN(0x1e, 0x0) 02:03:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x9000800}, 0xc) [ 568.422837] IPVS: ftp: loaded support on port[0] = 21 [ 568.434203] IPVS: ftp: loaded support on port[0] = 21 [ 568.554347] audit: type=1400 audit(1569722613.168:366): avc: denied { bind } for pid=18246 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 02:03:33 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:33 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305009effffff0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500006c00000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='net/ipv6_route\x00') preadv(r1, &(0x7f00000017c0), 0x1b4, 0x0) 02:03:33 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:33 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video37\x00', 0x2, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x6f], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88c8]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) [ 568.973395] nla_parse: 19 callbacks suppressed [ 568.973405] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 568.984628] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:03:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500007400000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:33 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500f0ffffff0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 569.229064] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 569.241053] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 569.275626] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:03:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500007a00000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:34 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000003400000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 569.459954] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:03:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000f000000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 569.526531] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:03:34 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000002c0), 0x10) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f0000000040)=0x81, 0x4) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000001600)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000300)=""/77, 0x4d}], 0x1}}], 0x1, 0x0, 0x0) [ 569.601651] audit: type=1800 audit(1569722614.208:367): pid=18261 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=17217 res=0 [ 569.644177] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:03:36 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:36 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500fffffffffffff00000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:36 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000002c0), 0x10) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$can_raw(r4, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r5}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 02:03:36 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000c01000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:36 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:36 executing program 1: tkill(0x0, 0x0) r0 = socket$inet6(0xa, 0x802, 0x73) sendmmsg$inet6(r0, &(0x7f0000000800)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000300)=[@flowinfo={{0x14, 0x29, 0x43}}], 0x18}}], 0x1, 0x0) [ 572.274393] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 572.283209] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:03:36 executing program 2: memfd_create(0x0, 0x0) creat(0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 02:03:36 executing program 1: memfd_create(0x0, 0x0) creat(0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) 02:03:36 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000100000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000003000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 572.466197] IPVS: ftp: loaded support on port[0] = 21 02:03:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000005000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:37 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000200000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 572.823973] IPVS: ftp: loaded support on port[0] = 21 02:03:37 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, 0x0, 0x0) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000006000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:37 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000300000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:37 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000007000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:37 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000400000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:37 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) 02:03:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0x10, 0x0) ptrace$pokeuser(0x6, 0x0, 0x388, 0xffffffffffffffff) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000063c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @gretap={{0xc, 0x1, 'gretap\x00'}, {0xc, 0x2, [@gre_common_policy, @gre_common_policy=[@IFLA_GRE_LINK={0x8}]]}}}]}, 0x3c}}, 0x0) 02:03:37 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000500000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000a000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000010c000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:38 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000600000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:39 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, 0x0, 0x0) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000e000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:39 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="3a7bdf1b1dcdeaa4"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=@newqdisc={0x148, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_PARMS={0x14}]}}]}, 0x148}}, 0x0) 02:03:39 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000700000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:39 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x3) 02:03:39 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(0xffffffffffffffff, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) [ 574.595676] nla_parse: 17 callbacks suppressed [ 574.595686] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 574.634375] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 574.670962] device veth4 entered promiscuous mode 02:03:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000c00e000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 574.691675] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:03:39 executing program 1: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:39 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000a00000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 574.758772] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:03:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000f000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 574.884390] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:03:39 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000e00000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 574.936276] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 574.975844] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 575.078663] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 575.108242] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:03:40 executing program 1: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000020000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:40 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000f00000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:40 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, 0x0, 0x0) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:40 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(0xffffffffffffffff, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) [ 576.245512] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:03:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000003f000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:40 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000002000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:41 executing program 1: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 576.468898] IPVS: ftp: loaded support on port[0] = 21 02:03:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000048000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:41 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000003f00000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 576.590981] IPVS: ftp: loaded support on port[0] = 21 02:03:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000004c000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:41 executing program 1: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:41 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000004000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:41 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:41 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(0xffffffffffffffff, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:03:41 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000004800000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000060000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:41 executing program 1: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x50000000000443) 02:03:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x50000000000443) 02:03:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000068000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:42 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000004c00000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x50000000000443) 02:03:42 executing program 1: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x50000000000443) 02:03:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000006c000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:42 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000006000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:43 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000074000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:43 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:43 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000006800000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:43 executing program 1: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x50000000000443) 02:03:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x50000000000443) 02:03:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000007a000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:43 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000006c00000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:43 executing program 1: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x50000000000443) 02:03:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x50000000000443) 02:03:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000ec0000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:43 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000007400000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:45 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000f0000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:45 executing program 1: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x50000000000443) 02:03:45 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000007a00000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x50000000000443) 02:03:45 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) [ 580.469520] nla_parse: 27 callbacks suppressed [ 580.469530] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 580.476093] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:03:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x50000000000443) 02:03:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000040030000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 580.547830] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:03:45 executing program 1: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x50000000000443) 02:03:45 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000ffffff9e00000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 580.689768] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 580.695076] IPVS: ftp: loaded support on port[0] = 21 02:03:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000003400000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 580.797832] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 580.876197] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 580.970486] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 581.192166] IPVS: ftp: loaded support on port[0] = 21 02:03:47 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, 0x0) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<'}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:03:47 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000000ec000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:47 executing program 1: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000fffff00000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:47 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) [ 582.966140] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 582.999604] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:03:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000100000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 583.006295] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:03:47 executing program 1: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:47 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000000000e400000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000200000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:47 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000fffffff000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:49 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, 0x0) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<'}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:03:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000300000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:49 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000007fffffff00000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:49 executing program 1: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r0, r1, 0x0, 0x50000000000443) 02:03:49 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000400000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:49 executing program 1: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r0, r1, 0x0, 0x50000000000443) 02:03:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r0, r1, 0x0, 0x50000000000443) 02:03:49 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000ffffffff00000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000500000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 584.754606] IPVS: ftp: loaded support on port[0] = 21 02:03:49 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000f0ffffffffffff00000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 585.174121] IPVS: ftp: loaded support on port[0] = 21 02:03:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000600000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r0, r1, 0x0, 0x50000000000443) 02:03:51 executing program 1: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r0, r1, 0x0, 0x50000000000443) 02:03:51 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000200000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:51 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, 0x0) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<'}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:03:51 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) [ 586.679753] nla_parse: 14 callbacks suppressed [ 586.679762] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 586.704881] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:03:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000700000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:51 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000300000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:51 executing program 1: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r0, r1, 0x0, 0x50000000000443) [ 586.799589] IPVS: ftp: loaded support on port[0] = 21 02:03:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 586.922154] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 586.948640] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:03:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000a00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:51 executing program 1: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:51 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000400000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:51 executing program 1: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 587.177573] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 587.201268] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 587.256425] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:03:53 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, 0x0, &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:53 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000500000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:53 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000010c00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:53 executing program 1: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:53 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) [ 588.567716] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 588.571398] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:03:53 executing program 1: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:53 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000e00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 588.657163] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 588.689785] IPVS: ftp: loaded support on port[0] = 21 02:03:53 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000f00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:53 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000600000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:53 executing program 1: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:54 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000002000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:54 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, 0x0, &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:54 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000700000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:54 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:54 executing program 1: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:55 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000a00000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:55 executing program 1: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:55 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000003f00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:55 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000e00000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:55 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000004800000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:56 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, 0x0, &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:56 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000f00000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000004c00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:56 executing program 1: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:56 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:56 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) [ 591.994067] nla_parse: 12 callbacks suppressed [ 591.994077] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 592.007776] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:03:56 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000006000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:56 executing program 1: socket$packet(0x11, 0x0, 0x300) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:56 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500004800000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:56 executing program 1: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 592.196481] IPVS: ftp: loaded support on port[0] = 21 [ 592.228570] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 592.275381] IPVS: ftp: loaded support on port[0] = 21 02:03:56 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 592.319604] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 592.379948] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:03:57 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500004c00000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000006800000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:57 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:57 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:57 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:57 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) [ 592.889947] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 592.902046] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:03:57 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:57 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 592.933934] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:03:57 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500006000000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000006c00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:57 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:57 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 593.083748] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 593.112809] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:03:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000007400000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:57 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500006800000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:57 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:57 executing program 1: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:59 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:59 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:03:59 executing program 1: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000007a00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:59 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:59 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500006c00000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:59 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500007400000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000ffffff9e00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:03:59 executing program 1: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:59 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:59 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:03:59 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500007a00000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:00 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:00 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000ec000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:00 executing program 1: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:04:00 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000e400000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:00 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:04:00 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:00 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:04:00 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000f000000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:00 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000fffffff000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:00 executing program 1: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:04:00 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:04:00 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000003000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 596.245385] IPVS: ftp: loaded support on port[0] = 21 [ 596.298866] IPVS: ftp: loaded support on port[0] = 21 02:04:01 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:01 executing program 1: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:04:01 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000005000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:01 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:01 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) sendfile(r1, r2, 0x0, 0x50000000000443) 02:04:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000f0ffff00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:01 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000006000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500007fffffff00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:01 executing program 1: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:04:01 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) sendfile(r1, r2, 0x0, 0x50000000000443) 02:04:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500009effffff00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:01 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000007000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 597.127118] nla_parse: 25 callbacks suppressed [ 597.127129] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 597.155791] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:04:02 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:02 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) sendfile(r1, r2, 0x0, 0x50000000000443) 02:04:02 executing program 1: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:04:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000f0ffffff00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:02 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000a000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:02 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r1, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:04:03 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x50000000000443) [ 598.398178] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 598.419749] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:04:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000034000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:03 executing program 1: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:04:03 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000e000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 598.588779] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:04:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000fffffffffffff000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:03 executing program 1: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) sendfile(r1, r2, 0x0, 0x50000000000443) [ 598.633868] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 598.659154] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 598.733153] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:04:04 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:04 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x50000000000443) 02:04:04 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000c00e000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:04 executing program 1: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) sendfile(r1, r2, 0x0, 0x50000000000443) 02:04:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000001000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:04 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r1, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) [ 600.063709] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 600.072592] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:04:04 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x50000000000443) 02:04:04 executing program 1: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) sendfile(r1, r2, 0x0, 0x50000000000443) 02:04:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000002000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:04 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000f000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:04 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x50000000000443) [ 600.281372] IPVS: ftp: loaded support on port[0] = 21 02:04:04 executing program 1: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x50000000000443) [ 600.645411] IPVS: ftp: loaded support on port[0] = 21 02:04:06 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:04:06 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000003000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:06 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r1, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:04:06 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000020000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:06 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x50000000000443) 02:04:06 executing program 1: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x50000000000443) 02:04:07 executing program 1: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x50000000000443) [ 602.391683] nla_parse: 4 callbacks suppressed [ 602.391692] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 602.415970] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 602.429313] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:04:07 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000004000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:07 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000003f000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:07 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x50000000000443) 02:04:07 executing program 1: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x50000000000443) [ 602.568201] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 602.607777] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:04:07 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000005000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 602.626579] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 602.727845] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:04:08 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:04:08 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x0) 02:04:08 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000040000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:08 executing program 1: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x50000000000443) 02:04:08 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000006000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:08 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) [ 603.969175] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 603.981705] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:04:08 executing program 1: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x50000000000443) 02:04:08 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x0) [ 604.010454] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:04:08 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000007000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:08 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000048000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 604.170109] IPVS: ftp: loaded support on port[0] = 21 [ 604.184585] IPVS: ftp: loaded support on port[0] = 21 02:04:08 executing program 1: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x0) 02:04:08 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000000000000a000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:09 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:04:09 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x0) 02:04:09 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:09 executing program 1: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x0) 02:04:09 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000000000010c000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:09 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000004c000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:09 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) 02:04:09 executing program 1: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x0) 02:04:09 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000000000000e000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:09 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000060000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:09 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0xc0801, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'n\x8a0\b\x00', 0x1301}) write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x0, '\x03\x0e\x80I?\x1e\xc2\xce\xc9`~\b\x05\xc4W\x8a\xd7\x02k\x00!\x05\x00\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xba\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=@\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ\x00\x00\x00\x00\x00\x00\x00'}]}, 0xfdef) 02:04:09 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000000000000f000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:11 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:11 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000068000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:11 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000020000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:11 executing program 2: r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1124, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) setuid(0x0) open(0x0, 0x0, 0x0) write$char_usb(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f00000002c0)=""/149, 0x95, 0x0, 0x0) setxattr$security_smack_transmute(&(0x7f00000003c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) pipe(0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x1) sendto$inet(r2, 0x0, 0xfffffffffffffff8, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x9000000) 02:04:11 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:11 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r2, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x11, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) 02:04:11 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000006c000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:11 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000000000003f000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:11 executing program 1: 02:04:11 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000074000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 606.844411] IPVS: ftp: loaded support on port[0] = 21 [ 606.873092] IPVS: ftp: loaded support on port[0] = 21 02:04:11 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000048000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:11 executing program 1: 02:04:12 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:12 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000007a000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000000000004c000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:12 executing program 2: 02:04:12 executing program 1: 02:04:12 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r1, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:04:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000060000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:12 executing program 2: [ 607.523062] nla_parse: 20 callbacks suppressed [ 607.523074] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 607.541516] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:04:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000000000000e000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:12 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000ec0000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:12 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000068000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 607.712392] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 607.734102] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 607.743972] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 607.791870] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 607.879992] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:04:13 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:13 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000e4000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:13 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000000000006c000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:13 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r1, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) [ 609.204991] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 609.227199] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:04:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000074000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:13 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000f0000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 609.254420] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:04:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000000000007a000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:14 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000040030000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000ffffff9e000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:15 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:15 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000003400000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:15 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:15 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000ec0000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:15 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r1, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:04:15 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000fffff00000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000fffffff0000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 611.004579] IPVS: ftp: loaded support on port[0] = 21 02:04:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000007fffffff000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:15 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000100000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000ffffffff000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:15 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000200000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 611.544574] IPVS: ftp: loaded support on port[0] = 21 [ 611.545220] IPVS: ftp: loaded support on port[0] = 21 [ 611.564563] IPVS: ftp: loaded support on port[0] = 21 02:04:16 executing program 2: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:04:16 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000300000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000f0ffffffffffff000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:16 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:16 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:16 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:16 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000400000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000002000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000003000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:16 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000500000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:16 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000004000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:16 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000600000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000005000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:17 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000700000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:18 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:18 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000a00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:18 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000006000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:18 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000500000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:18 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) [ 613.581139] nla_parse: 33 callbacks suppressed [ 613.581149] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 613.598891] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:04:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000007000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 613.648997] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 613.689446] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:04:18 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000e00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 613.761793] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 613.769916] IPVS: ftp: loaded support on port[0] = 21 02:04:18 executing program 1: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r0, r1, 0x0, 0x50000000000443) 02:04:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000a000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 613.816515] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 613.896328] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 613.910973] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:04:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000e000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:18 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000f00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 614.004067] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 614.069710] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:04:20 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:20 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, 0x0) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<'}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:04:20 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000f000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:20 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000002000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:20 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:20 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:20 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000003f00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:20 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000048000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:20 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000004c000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:20 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000004000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:20 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000060000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:20 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000004800000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:22 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:22 executing program 5: read$FUSE(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r0, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r1, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:04:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000068000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:22 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, 0x0) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<'}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:04:22 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:22 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000004c00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000006c000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:22 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000006000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000074000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 617.753896] IPVS: ftp: loaded support on port[0] = 21 02:04:22 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000006800000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000007a000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:22 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000006c00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 618.207118] IPVS: ftp: loaded support on port[0] = 21 [ 618.242727] IPVS: ftp: loaded support on port[0] = 21 [ 618.255798] IPVS: ftp: loaded support on port[0] = 21 02:04:23 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000f0000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:23 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000007400000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:23 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:23 executing program 5: read$FUSE(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r0, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r1, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:04:23 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, 0x0) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<'}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) [ 618.750925] nla_parse: 24 callbacks suppressed [ 618.750934] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 618.789043] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:04:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000c010000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:23 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000007a00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:23 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000ffffff9e00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000030000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 618.924260] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 618.954748] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:04:23 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000ec000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000050000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 619.047127] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 619.059337] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 619.075795] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 619.138682] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 619.201464] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:04:25 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:25 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000e400000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:25 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000060000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 620.573287] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:04:27 executing program 2: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff4b3) prctl$PR_SET_ENDIAN(0x1e, 0x0) 02:04:27 executing program 5: read$FUSE(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r0, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r1, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:04:27 executing program 1: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff1b0) prctl$PR_SET_ENDIAN(0x1e, 0x0) 02:04:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000070000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:27 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000fffffff000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:27 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000a0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:27 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000f0ffff00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:27 executing program 2: [ 622.541341] IPVS: ftp: loaded support on port[0] = 21 02:04:27 executing program 1: 02:04:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000010c0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:27 executing program 2: 02:04:27 executing program 1: [ 623.076537] IPVS: ftp: loaded support on port[0] = 21 02:04:27 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:27 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500007fffffff00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000e0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:27 executing program 2: 02:04:27 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:04:27 executing program 1: pipe(0x0) r0 = socket$inet6(0xa, 0x802, 0x73) sendmmsg$inet6(r0, &(0x7f0000000800)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @loopback, 0x48}, 0x1c, 0x0}}], 0x1, 0x0) 02:04:27 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000080)={0x2, @sliced={0x0, [0x9, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}) 02:04:27 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500009effffff00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000c00e0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:27 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0585611, &(0x7f0000000040)={0x0, 0x1, 0x0, [0x100004]}) 02:04:28 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f6105000200000a1f000007042808000800154004000300", 0x24}], 0x1}, 0x0) 02:04:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000f0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 623.565410] netlink: 'syz-executor.2': attribute type 21 has an invalid length. [ 623.632875] netlink: 'syz-executor.2': attribute type 21 has an invalid length. 02:04:29 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:29 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000f0ffffff00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x21) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:04:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000200000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:29 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:04:29 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000080)={0x2, @sliced}) [ 624.896379] nla_parse: 16 callbacks suppressed [ 624.896387] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 624.916133] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:04:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000190007041dfffd946f6105000200000a1f0000030028080008000f0004000300280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23", 0x48}], 0x1}, 0x0) 02:04:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000003f0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:29 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000034000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 624.980586] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:04:29 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = dup(r0) ioctl$PPPIOCSMRU(r1, 0x40047452, 0x0) 02:04:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000480000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 625.091346] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 625.103390] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:04:29 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000fffffffffffff000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 625.190128] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 625.265737] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 625.287168] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:04:31 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:31 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @local, @multicast2}, 0xc) connect$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) [ 626.682875] IPVS: ftp: loaded support on port[0] = 21 02:04:32 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x0) 02:04:32 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000004c0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:32 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000001000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:32 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:04:32 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @local, @multicast2}, 0xc) connect$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 02:04:32 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) [ 627.948017] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 627.953783] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:04:32 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000500)={0xd}) 02:04:32 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000600000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:32 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000002000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:32 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @local, @multicast2}, 0xc) connect$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 02:04:32 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000680000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:32 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000003000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f00008f6ff9)='mounts\x00') close(r0) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x0, 0x0) mount$9p_fd(0x20000000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 02:04:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000006c0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:33 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x88, 0x64, &(0x7f0000000480)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) syz_emit_ethernet(0x3e, &(0x7f0000694ffe)=ANY=[@ANYBLOB="ffffffffffff0180c200000086dd6006f52600081100fe8000000000000000000095950000ffff0200000000000000000067516a23bdaf1460dfe8000000"], 0x0) 02:04:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000740000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:33 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000004000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="38f328415a871be3101f20f488771cd2e92112444a4b00800000be"], 0x0, 0x1b}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000400)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:04:33 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<'}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:04:33 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000007a0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:33 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000005000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netstat\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 02:04:33 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000006000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000ec00000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 629.319922] IPVS: ftp: loaded support on port[0] = 21 02:04:34 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f6105000200000a1f000007042808000800164004000300280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:04:34 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000007000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000f00000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:34 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000000000000a000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000400300000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:34 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<'}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:04:34 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000000000000e000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/packet\x00') 02:04:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000034000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:34 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f6105000200000a1f0000070428080008001e4004000300280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:04:34 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) [ 630.096269] nla_parse: 23 callbacks suppressed [ 630.096281] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 630.142607] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:04:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000fffff000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:34 executing program 1: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000080)=""/44, 0xffffffffffffffea, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) [ 630.192182] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 630.203795] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 02:04:34 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000000000000f000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 630.279488] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:04:34 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f6105000200000a1f0000070428080008001e4004000300280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:04:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000001000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 630.353573] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 630.386693] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:04:35 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000020000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 630.460573] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 630.499918] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 630.529570] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:04:37 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<'}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:04:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000002000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:37 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000000000003f000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:37 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f6105000200000a1f0000070428080008001e4004000300280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:04:37 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000003000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000080)=""/44, 0xffffffffffffffea, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 02:04:37 executing program 1: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000080)=""/44, 0xffffffffffffffea, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 02:04:37 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000040000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000004000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 632.967781] IPVS: ftp: loaded support on port[0] = 21 [ 632.980673] IPVS: ftp: loaded support on port[0] = 21 02:04:37 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000048000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000005000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:38 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:38 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000000000004c000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000006000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:38 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:38 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000060000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000007000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:39 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000001c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ftruncate(r1, 0x0) fsetxattr(r1, 0x0, 0x0, 0x0, 0xbf2f478d4abd4411) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x32, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 02:04:39 executing program 1: mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000080)=""/44, 0xffffffffffffffea, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 02:04:39 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000068000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000000a000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x800000000005, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000740)={0x0, {{0x2, 0x0, @multicast2}}}, 0x90) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x2, &(0x7f0000000980)=[{&(0x7f0000000240)="0582a88a0822af49137c89fd240a02e7ae7d23196739b1f35c3d028bcb8145db18667569d171cd455f5977d0697e", 0x2e, 0x8001}, {0x0, 0x0, 0x7}], 0x11c01, &(0x7f0000000a40)={[{@numtail='nonumtail=0'}], [{@fsname={'fsname', 0x3d, '#'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}]}) [ 635.263294] nla_parse: 18 callbacks suppressed [ 635.263305] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 635.279223] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 635.284739] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:04:39 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000000000006c000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 635.463067] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 635.520238] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:04:41 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000010c000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:41 executing program 2: openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) 02:04:41 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000074000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:41 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:41 executing program 2: creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7efffe, 0x4002012, r0, 0x0) [ 636.778392] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 636.794871] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:04:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000000e000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:41 executing program 1: [ 636.854266] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:04:41 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000000000007a000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 636.914377] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 636.946434] audit: type=1804 audit(1569722681.558:368): pid=20285 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir507751353/syzkaller.knRcTX/437/bus" dev="sda1" ino=16977 res=1 02:04:41 executing program 1: 02:04:41 executing program 2: 02:04:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000000f000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 637.031975] audit: type=1804 audit(1569722681.598:369): pid=20285 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir507751353/syzkaller.knRcTX/437/bus" dev="sda1" ino=16977 res=1 [ 637.067923] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:04:43 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:43 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000ffffff9e000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:43 executing program 2: 02:04:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000020000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:43 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:43 executing program 1: 02:04:43 executing program 1: 02:04:43 executing program 2: 02:04:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000003f000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:43 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000ec0000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:43 executing program 2: 02:04:43 executing program 1: [ 638.672161] IPVS: ftp: loaded support on port[0] = 21 [ 638.682282] IPVS: ftp: loaded support on port[0] = 21 02:04:43 executing program 2: 02:04:43 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000000000e4000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:43 executing program 1: 02:04:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000048000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:43 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:43 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:43 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000fffffff0000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000004c000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:43 executing program 2: 02:04:43 executing program 1: 02:04:44 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000007fffffff000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:44 executing program 1: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff4b8) prctl$PR_SET_ENDIAN(0x1e, 0x0) 02:04:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000060000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:44 executing program 2: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff8c5) prctl$PR_SET_ENDIAN(0x1e, 0x0) 02:04:44 executing program 1: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff1aa) prctl$PR_SET_ENDIAN(0x1e, 0x0) 02:04:44 executing program 2: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff1a3) prctl$PR_SET_ENDIAN(0x1e, 0x0) 02:04:45 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:45 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:45 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000ffffffff000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:45 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:45 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000068000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 640.751892] nla_parse: 17 callbacks suppressed [ 640.751902] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 640.771885] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 640.780749] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:04:45 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000f0ffffffffffff000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 640.814080] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:04:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000006c000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 640.879390] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 640.905857] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:04:45 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000002000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000074000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 640.943605] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:04:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000007a000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 641.013519] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 641.044833] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:04:45 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000003000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 641.061303] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:04:46 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:46 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000ffffff9e000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:46 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000004000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:46 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:46 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:47 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000005000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000ec0000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:47 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000006000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 642.544064] IPVS: ftp: loaded support on port[0] = 21 02:04:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000fffffff0000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:47 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000007000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000f0ffff000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 643.008021] IPVS: ftp: loaded support on port[0] = 21 [ 643.053435] IPVS: ftp: loaded support on port[0] = 21 [ 643.065080] IPVS: ftp: loaded support on port[0] = 21 02:04:48 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000a000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000007fffffff000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:48 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:48 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:48 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:48 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:48 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000e000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000009effffff000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:48 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000f000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000f0ffffff000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:48 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000048000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000340000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:48 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000004c000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000fffffffffffff0000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:49 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000060000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000000010000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:51 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:51 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:51 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:51 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000000020000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:51 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000068000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000000030000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 647.243004] nla_parse: 30 callbacks suppressed [ 647.243013] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 647.276150] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:04:52 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000006c000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:52 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000000040000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 647.380928] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 647.381503] IPVS: ftp: loaded support on port[0] = 21 02:04:52 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000074000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 647.454496] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 647.475427] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 647.495210] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:04:52 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000000050000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 647.610319] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 647.639322] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 647.650744] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:04:52 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000007a000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 647.809271] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 647.944201] IPVS: ftp: loaded support on port[0] = 21 [ 647.973306] IPVS: ftp: loaded support on port[0] = 21 [ 648.001218] IPVS: ftp: loaded support on port[0] = 21 02:04:52 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:52 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:52 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:52 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:52 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000000060000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:52 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000e4000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:53 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000000070000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:53 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000f0000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:53 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000000000000a0000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:53 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000030000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:53 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000000000010c0000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:53 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000050000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:54 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:54 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000000000000e0000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:54 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000060000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:54 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:54 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:54 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:54 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000000000000f0000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:54 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000070000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:54 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000000200000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:54 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000a0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:54 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000000000003f0000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:54 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000e0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:56 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000000480000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:56 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000c00e0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:56 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:56 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:56 executing program 2: read$FUSE(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r0, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r1, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:04:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000000000004c0000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:56 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000f0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000000600000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 652.174512] IPVS: ftp: loaded support on port[0] = 21 [ 652.311976] nla_parse: 29 callbacks suppressed [ 652.311985] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 652.323027] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 652.338813] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:04:57 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000200000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000000680000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000000000006c0000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 652.471599] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 652.485695] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 652.508593] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 652.614819] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 652.751017] IPVS: ftp: loaded support on port[0] = 21 [ 652.766411] IPVS: ftp: loaded support on port[0] = 21 [ 652.793884] IPVS: ftp: loaded support on port[0] = 21 02:04:57 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000003f0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:57 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r1, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:04:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000000740000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:57 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:57 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:57 executing program 2: read$FUSE(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r0, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r1, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) [ 653.154470] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 653.164760] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 653.172105] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:04:57 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000400000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000000000007a0000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:58 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000480000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000ffffff9e0000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:58 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000004c0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000000000000ec00000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:58 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000600000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:59 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r1, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:04:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000fffffff00000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:59 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:59 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000680000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:59 executing program 2: read$FUSE(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r0, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r1, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:04:59 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:04:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000007fffffff0000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:59 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000006c0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000ffffffff0000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:59 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000740000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000f0ffffffffffff0000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:04:59 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000007a0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:01 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r1, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:05:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000020000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:01 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000ec00000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:01 executing program 2: read$FUSE(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r0, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r1, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:05:01 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:01 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:01 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000e40000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000030000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:01 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000f00000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 657.108150] IPVS: ftp: loaded support on port[0] = 21 02:05:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000040000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:01 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000400300000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 657.351148] nla_parse: 29 callbacks suppressed [ 657.351159] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 657.426311] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:05:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000050000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 657.484545] IPVS: ftp: loaded support on port[0] = 21 [ 657.510667] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 657.524512] IPVS: ftp: loaded support on port[0] = 21 [ 657.582546] IPVS: ftp: loaded support on port[0] = 21 [ 657.605951] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:05:02 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000060000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:02 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000034000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:02 executing program 2: read$FUSE(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r0, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r1, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:05:02 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:02 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) [ 658.112584] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:05:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000070000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 658.167623] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 658.221390] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:05:02 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000fffff000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 658.266558] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:05:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000a0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:03 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000001000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 658.340484] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:05:03 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000002000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000e0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 658.416858] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:05:04 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000f0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:04 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000003000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:06 executing program 2: read$FUSE(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r0, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r1, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:05:06 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:06 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:06 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000480000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:06 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000004000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:06 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000004c0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:06 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000005000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 661.924403] IPVS: ftp: loaded support on port[0] = 21 02:05:06 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000600000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:06 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000006000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:06 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:06 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000680000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:06 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000007000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 662.270360] IPVS: ftp: loaded support on port[0] = 21 [ 662.450673] IPVS: ftp: loaded support on port[0] = 21 [ 662.698495] IPVS: ftp: loaded support on port[0] = 21 02:05:09 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000a00000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:09 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000006c0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:09 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r1, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:05:09 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000000a000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:09 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev}, {0x0, @random="e7cc2c4aec62"}, 0x0, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:09 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) [ 664.455814] nla_parse: 19 callbacks suppressed [ 664.455825] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 664.465517] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 664.492223] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 02:05:09 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000740000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:09 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) [ 664.520897] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:05:09 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000000e000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 664.582508] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:05:09 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000007a0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:09 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000000f000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 664.636526] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 664.650130] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:05:09 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000f00000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:09 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000020000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 664.719828] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 664.735745] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 664.747861] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:05:09 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000c0100000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:10 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r1, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:05:10 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000003f000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:10 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000300000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:10 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev}, {0x0, @random="e7cc2c4aec62"}, 0x0, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:10 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:10 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:11 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000500000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:11 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000040000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 666.592502] IPVS: ftp: loaded support on port[0] = 21 [ 666.612843] IPVS: ftp: loaded support on port[0] = 21 [ 666.639123] IPVS: ftp: loaded support on port[0] = 21 02:05:11 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000600000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 666.677313] IPVS: ftp: loaded support on port[0] = 21 02:05:11 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000048000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:11 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000004c000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:11 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000700000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:12 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r1, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:05:12 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000060000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000a00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:12 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev}, {0x0, @random="e7cc2c4aec62"}, 0x0, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:12 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:12 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000010c00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:12 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000068000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:12 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000006c000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000e00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000c00e00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:12 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000074000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:14 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:05:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000f00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:14 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000007a000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:14 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(0xffffffffffffffff, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:05:14 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x0, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:14 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) [ 669.866740] nla_parse: 26 callbacks suppressed [ 669.866751] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 669.894978] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 669.951436] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:05:14 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000ffffff9e000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000002000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 670.092793] IPVS: ftp: loaded support on port[0] = 21 02:05:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000003f00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 670.125483] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 670.143395] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 670.172686] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:05:14 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000ec0000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 670.236469] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:05:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000004800000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:15 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000e4000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 670.352282] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 670.375898] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 670.386987] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 670.614837] IPVS: ftp: loaded support on port[0] = 21 [ 670.787064] IPVS: ftp: loaded support on port[0] = 21 [ 670.814269] IPVS: ftp: loaded support on port[0] = 21 02:05:15 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:05:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000004c00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:15 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000fffffff0000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:15 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x0, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:15 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(0xffffffffffffffff, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:05:15 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000006000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:15 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000f0ffff000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000006800000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:15 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000007fffffff000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000006c00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:15 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000009effffff000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:17 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:05:17 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000f0ffffff000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000007400000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:19 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x0, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:19 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(0xffffffffffffffff, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:05:19 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:19 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000007a00000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:19 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000340000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:19 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:19 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000ec000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:19 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000fffffffffffff0000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:19 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000f000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 674.872924] nla_parse: 20 callbacks suppressed [ 674.872936] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 674.900742] IPVS: ftp: loaded support on port[0] = 21 [ 674.912159] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:05:19 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000000010000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:19 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000004003000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 674.955749] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 675.048302] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 675.086423] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:05:19 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000000020000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 675.099837] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 675.224173] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 675.262816] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 675.382094] IPVS: ftp: loaded support on port[0] = 21 [ 675.552237] IPVS: ftp: loaded support on port[0] = 21 [ 675.575955] IPVS: ftp: loaded support on port[0] = 21 02:05:20 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:20 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:20 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000340000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:20 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000000030000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:20 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:20 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) [ 675.800797] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 675.809957] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:05:20 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000fffff0000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:20 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000000040000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:20 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000000050000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:20 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000010000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:20 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000000060000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:20 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000020000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:21 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:22 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000030000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:22 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000000070000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:23 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:23 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000000000000a0000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000040000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:23 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:24 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:24 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:24 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000000000000e0000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000050000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:24 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000000000000f0000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 679.618150] IPVS: ftp: loaded support on port[0] = 21 02:05:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000060000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000070000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:24 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000000200000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 680.053855] IPVS: ftp: loaded support on port[0] = 21 [ 680.252635] IPVS: ftp: loaded support on port[0] = 21 [ 680.285431] IPVS: ftp: loaded support on port[0] = 21 02:05:25 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:25 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000000a0000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:25 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000000000003f0000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000340000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:25 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, 0x0, &(0x7f00000000c0)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:25 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, 0x0, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) [ 680.509625] nla_parse: 23 callbacks suppressed [ 680.509635] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 680.540373] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:05:25 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000010c0000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 680.608784] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 680.621322] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:05:25 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000000400000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:25 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(0xffffffffffffffff, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:05:25 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000000e0000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:25 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000000480000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 680.774473] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 680.775445] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 680.800122] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 680.879454] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 680.903389] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:05:25 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000000f0000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 680.926077] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:05:26 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:26 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000000000004c0000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000200000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:26 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(0xffffffffffffffff, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:05:26 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, 0x0, &(0x7f00000000c0)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:26 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, 0x0, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000003f0000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:26 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000000600000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000480000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:27 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000000680000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000004c0000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:27 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000000000006c0000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:28 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:28 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000000740000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000600000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:28 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(0xffffffffffffffff, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r4}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r2, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:05:28 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, 0x0, &(0x7f00000000c0)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:28 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, 0x0, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000680000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:29 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000000000007a0000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 684.589243] IPVS: ftp: loaded support on port[0] = 21 [ 684.595938] IPVS: ftp: loaded support on port[0] = 21 [ 684.625867] IPVS: ftp: loaded support on port[0] = 21 02:05:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000006c0000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 684.639340] IPVS: ftp: loaded support on port[0] = 21 02:05:29 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000ffffff9e0000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000740000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:29 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000000000000ec00000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:30 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:05:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000007a0000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:30 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000000e40000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:30 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:30 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:30 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000500000000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 685.638304] nla_parse: 24 callbacks suppressed [ 685.638314] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 685.643454] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:05:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000ffffff9e0000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 685.683509] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 685.683694] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:05:30 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000fffffff00000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:30 executing program 1: 02:05:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000000ec00000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 685.851044] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 685.870367] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:05:30 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bind$tipc(r0, &(0x7f0000000240), 0x10) 02:05:30 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000000007fffffff0000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 685.946753] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 686.058431] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 686.083591] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:05:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000fffffff00000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:31 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:05:31 executing program 1: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 02:05:31 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) [ 687.140812] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:05:33 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:33 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000ffffffff0000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000010763050000000000f0ffff0000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:33 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000500)={0xd}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 02:05:33 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:33 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r5) unshare(0x40000000) 02:05:33 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000f0ffffffffffff0000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000007fffffff0000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 689.394003] IPVS: ftp: loaded support on port[0] = 21 02:05:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000009effffff0000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:34 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000020000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000f0ffffff0000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:34 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000080)={0x2, @sliced={0x0, [0x9]}}) [ 689.978504] IPVS: ftp: loaded support on port[0] = 21 [ 690.005177] IPVS: ftp: loaded support on port[0] = 21 02:05:34 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:34 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000030000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000003400000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 02:05:34 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:34 executing program 2: getpid() r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv4_newrule={0x3c, 0x20, 0x201, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, [@FRA_FLOW={0x8}, @FRA_GENERIC_POLICY=@FRA_OIFNAME={0x14, 0x11, 'bond_slave_0\x00'}]}, 0x3c}}, 0x0) 02:05:34 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000040000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000fffffffffffff00000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x69, 0x11, 0x1a001000044}, [@ldst={0x5, 0x3}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x1, 0x0) write$nbd(r0, &(0x7f0000000080)={0x1000002, 0x0, 0x0, 0x0, 0x0, "82b0cfc4336aa6771538be0633e8bd3410000000000000005616b17333ad88f7e4a258981e458e96afda2a87223ba7f4"}, 0x40) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x400000, 0x0) r2 = socket$inet6(0xa, 0x3, 0x6) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x8, 0x810, r2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) connect$inet6(r2, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r4, 0xc05, 0x70bd27, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x8040) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xa8201000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x20004811) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r4, 0x4, 0x70bd2a, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x1) 02:05:35 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000050000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000000000100000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:35 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000060000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 690.643565] dlm: plock device version mismatch: kernel (1.2.0), user (33554433.0.0) [ 690.770435] nla_parse: 18 callbacks suppressed [ 690.770444] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 690.790869] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:05:36 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r0, 0x203, 0xffffffffffffffff) bind$inet(r0, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000100)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000002d5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, 0x0, &(0x7f0000000140)) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg(r2, &(0x7f0000004e00)=[{{0x0, 0x0, 0x0}}], 0x1c3, 0x0) 02:05:36 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000000000200000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:36 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000070000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x133, 0x0, 0x0, 0xff7d) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x40, 0x0, 0xfffffffffffffdd4) shmat(0x0, &(0x7f0000005000/0x2000)=nil, 0x406000) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:05:36 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x0, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) 02:05:36 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) write$P9_ROPEN(r1, 0x0, 0xfffffffffffffef2) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) mkdir(0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_MCE_KILL_GET(0x22) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280), 0x4) fcntl$getflags(r2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r3 = openat$dsp(0xffffffffffffff9c, 0x0, 0x2800, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2800, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) lstat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000002100)='overlay\x00', 0x24800, &(0x7f0000002200)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, '/selinux/commit_pending_bools\x00'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r5}}, {@measure='measure'}, {@seclabel='seclabel'}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, {0x0, @random="e7cc2c4aec62"}, 0x1a, {0x2, 0x4e24, @multicast1}, 'ip_vti0\x00'}) write$FUSE_LSEEK(r4, &(0x7f0000000100)={0x18, 0x0, 0x4}, 0x18) read$FUSE(r3, &(0x7f00000010c0), 0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f00000020c0)={0x6a, 0x28, [0x0, 0x7933, 0x126, 0x7f, 0x3, 0x9, 0x401, 0x9, 0x3, 0x9]}) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r6) unshare(0x40000000) [ 691.767405] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 691.798060] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:05:36 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000000000300000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 691.829953] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:05:36 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000a0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 691.955721] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 691.968801] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:05:36 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000e0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:36 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000000000400000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 692.010974] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:05:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x133, 0x0, 0x0, 0xff7d) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000080)="66b829018ec0b9800000c00f3235002000000f3066baf80cb8c8f61a8eef66bafc0ced0f787e0036400fc75a00c4e1f9e601c4018575504f0f87d485a71b64440f01c43e662666470f38804185", 0x4d}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x40, 0x0, 0xfffffffffffffdd4) setxattr$security_evm(0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="de000000"], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 692.124655] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 692.128040] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:05:36 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="1800000001076305000000000f0000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 692.288612] ================================================================== [ 692.296336] BUG: KASAN: null-ptr-deref in kvm_write_guest_virt_system+0x64/0x90 [ 692.303808] Write of size 24 at addr 0000000000000000 by task syz-executor.2/21755 [ 692.311521] [ 692.313165] CPU: 1 PID: 21755 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 692.320097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 692.329455] Call Trace: [ 692.332074] dump_stack+0x172/0x1f0 [ 692.335718] ? kvm_write_guest_virt_system+0x64/0x90 [ 692.335747] kasan_report.cold+0x199/0x2ba [ 692.335769] check_memory_region+0x123/0x190 [ 692.335788] memset+0x24/0x40 [ 692.352715] kvm_write_guest_virt_system+0x64/0x90 [ 692.352800] handle_vmread+0x7fe/0xa10 [ 692.352818] ? handle_invpcid+0xa80/0xa80 [ 692.365844] ? __lock_is_held+0xb6/0x140 [ 692.370017] ? __lock_is_held+0xb6/0x140 [ 692.374105] ? handle_invpcid+0xa80/0xa80 [ 692.378270] vmx_handle_exit+0x276/0x16b0 [ 692.382432] ? lock_acquire+0x16f/0x3f0 02:05:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x10, 0xcc70f7c46e283195, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x20}}, 0x0) 02:05:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000000000000000000500000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) 02:05:37 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000000107630500000000480000000000000000000000ce31f9d351caa9cf65614213c8ec7a31a3c82427305cd2215f62e7a7c8a3ac61cfe917da611b091a4cbaefaa756605821a02ed77c0f4b7d3314f33455afe40bbe835a04fbcb909fdfa00fe9a41a4fbfd8fd333"], 0x18}}, 0x0) [ 692.386481] ? vcpu_enter_guest+0xf15/0x5ed0 [ 692.390905] vcpu_enter_guest+0x10ca/0x5ed0 [ 692.395240] ? emulator_read_emulated+0x50/0x50 [ 692.399925] ? lock_acquire+0x16f/0x3f0 [ 692.403965] ? kvm_check_async_pf_completion+0x2d8/0x440 [ 692.409437] kvm_arch_vcpu_ioctl_run+0x457/0x16b0 [ 692.414297] ? kvm_arch_vcpu_ioctl_run+0x457/0x16b0 [ 692.419333] kvm_vcpu_ioctl+0x4dc/0xf90 [ 692.423344] ? kvm_vcpu_block+0xcc0/0xcc0 [ 692.427504] ? mark_held_locks+0x100/0x100 [ 692.431768] ? __might_fault+0x12b/0x1e0 [ 692.435848] ? __fget+0x340/0x540 [ 692.439314] ? find_held_lock+0x35/0x130 [ 692.443390] ? __fget+0x340/0x540 [ 692.446867] ? kvm_vcpu_block+0xcc0/0xcc0 [ 692.451028] do_vfs_ioctl+0xd5f/0x1380 [ 692.454943] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 692.460554] ? selinux_file_ioctl+0x125/0x5e0 [ 692.465063] ? ioctl_preallocate+0x210/0x210 [ 692.469493] ? selinux_file_mprotect+0x620/0x620 [ 692.469518] ? iterate_fd+0x360/0x360 [ 692.469588] ? nsecs_to_jiffies+0x30/0x30 [ 692.469612] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 692.469625] ? security_file_ioctl+0x8d/0xc0 [ 692.469640] ksys_ioctl+0xab/0xd0 [ 692.469655] __x64_sys_ioctl+0x73/0xb0 [ 692.469675] do_syscall_64+0xfd/0x620 [ 692.469694] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 692.469704] RIP: 0033:0x459a29 [ 692.469716] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 692.469723] RSP: 002b:00007fbd58fcac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 692.469737] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 692.469745] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 692.469752] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 692.469760] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbd58fcb6d4 [ 692.469768] R13: 00000000004c2ddb R14: 00000000004d6618 R15: 00000000ffffffff [ 692.469787] ================================================================== [ 692.469792] Disabling lock debugging due to kernel taint [ 692.471985] kobject: 'sit0' (000000007eeceec6): kobject_cleanup, parent (null) [ 692.479394] kobject: 'loop1' (000000008b0dee24): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 692.485202] kobject: 'sit0' (000000007eeceec6): calling ktype release [ 692.539055] Kernel panic - not syncing: panic_on_warn set ... [ 692.539055] [ 692.549205] kobject: 'sit0': free name [ 692.553428] CPU: 0 PID: 21755 Comm: syz-executor.2 Tainted: G B 4.19.75 #0 [ 692.560885] kobject: 'sit0' (00000000bf88e163): kobject_cleanup, parent (null) [ 692.567933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 692.567938] Call Trace: [ 692.567955] dump_stack+0x172/0x1f0 [ 692.567978] ? kvm_write_guest_virt_system+0x64/0x90 [ 692.575316] kobject: 'sit0' (00000000bf88e163): calling ktype release [ 692.582592] panic+0x263/0x507 [ 692.582604] ? __warn_printk+0xf3/0xf3 [ 692.582621] ? kvm_write_guest_virt_system+0x64/0x90 [ 692.588128] kobject: 'sit0': free name [ 692.596265] ? preempt_schedule+0x4b/0x60 [ 692.687203] ? ___preempt_schedule+0x16/0x18 [ 692.691658] ? trace_hardirqs_on+0x5e/0x220 [ 692.695978] ? kvm_write_guest_virt_system+0x64/0x90 [ 692.701114] kasan_end_report+0x47/0x4f [ 692.705110] kasan_report.cold+0xa9/0x2ba [ 692.709251] check_memory_region+0x123/0x190 [ 692.713644] memset+0x24/0x40 [ 692.716738] kvm_write_guest_virt_system+0x64/0x90 [ 692.721761] handle_vmread+0x7fe/0xa10 [ 692.725791] ? handle_invpcid+0xa80/0xa80 [ 692.729934] ? __lock_is_held+0xb6/0x140 [ 692.734029] ? __lock_is_held+0xb6/0x140 [ 692.738221] ? handle_invpcid+0xa80/0xa80 [ 692.742356] vmx_handle_exit+0x276/0x16b0 [ 692.746494] ? lock_acquire+0x16f/0x3f0 [ 692.750450] ? vcpu_enter_guest+0xf15/0x5ed0 [ 692.754859] vcpu_enter_guest+0x10ca/0x5ed0 [ 692.759165] ? emulator_read_emulated+0x50/0x50 [ 692.763840] ? lock_acquire+0x16f/0x3f0 [ 692.767806] ? kvm_check_async_pf_completion+0x2d8/0x440 [ 692.773246] kvm_arch_vcpu_ioctl_run+0x457/0x16b0 [ 692.778076] ? kvm_arch_vcpu_ioctl_run+0x457/0x16b0 [ 692.783078] kvm_vcpu_ioctl+0x4dc/0xf90 [ 692.787037] ? kvm_vcpu_block+0xcc0/0xcc0 [ 692.791169] ? mark_held_locks+0x100/0x100 [ 692.795393] ? __might_fault+0x12b/0x1e0 [ 692.799477] ? __fget+0x340/0x540 [ 692.803002] ? find_held_lock+0x35/0x130 [ 692.807046] ? __fget+0x340/0x540 [ 692.810482] ? kvm_vcpu_block+0xcc0/0xcc0 [ 692.814613] do_vfs_ioctl+0xd5f/0x1380 [ 692.818490] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 692.824010] ? selinux_file_ioctl+0x125/0x5e0 [ 692.828491] ? ioctl_preallocate+0x210/0x210 [ 692.832882] ? selinux_file_mprotect+0x620/0x620 [ 692.837622] ? iterate_fd+0x360/0x360 [ 692.841414] ? nsecs_to_jiffies+0x30/0x30 [ 692.845547] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 692.851076] ? security_file_ioctl+0x8d/0xc0 [ 692.855479] ksys_ioctl+0xab/0xd0 [ 692.858916] __x64_sys_ioctl+0x73/0xb0 [ 692.862805] do_syscall_64+0xfd/0x620 [ 692.866591] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 692.871760] RIP: 0033:0x459a29 [ 692.874936] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 692.893835] RSP: 002b:00007fbd58fcac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 692.901528] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 692.908791] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 692.916049] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 692.923311] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbd58fcb6d4 [ 692.930566] R13: 00000000004c2ddb R14: 00000000004d6618 R15: 00000000ffffffff [ 692.939209] Kernel Offset: disabled [ 692.942855] Rebooting in 86400 seconds..