28f0cbb95bf8b74e34c376a5d3bdbe7098b995f46d67f5e6bf773aac260d57db031406888377bb87e01e3ca2762e44aa9091e106addace87246b99cd1a8469779ccc8f5d33b179f9210393b30995fe5c1860262c6039363f43c07d4da358b62846507d0a7fb6dc19770e4284920a109292e3efa5717132ed38574cab52b7781622ce0486df86767a1f7595bcf6eaa5d7718749338c1f7eedbc25bc3fdaafed34b224b650dc693a3b9509d673041bfc9ed24712a8fb28d9626726b989fe826f51fccde1a338c61170b9d65c842df03675964d0029ebb86e260ce16ad2ab16a741b6fe9bc04533879186bdbe86fee154b879c05174cd88b020a5f1ee22080b3c105c848cb1b1417f74c7b2eb6d5ef97aeeecdea19148b7681c1586f8485a84c1b369ba026afbacf08128b53a90e0f378b0befed7be0181c9a7ddb8283f46b0ee84b2982cc2b54c57c4a50037405b3c1eb9cb6f5071507188325fa5176a1d824d0ee4f658de7ec0b836577eafa1d4b2324557d778ff03268916486e76744841396f7fdaf5c5e8d696a3ea9d3cdf9821508cbeed34dcced0657e7da0f56e17d2056e42464fb1cc0bd19f23a82ddc86aebc025d882fbb043ea7582e7bdd6fbb5c09dab383c3d8aa08ed9e84d44d3965ce5221d6ea0f3285cf70078ebff00abe41e78c78e2371a563f95c73c69c3891ee36c37aa309063451906ec77b80266b74a33d889940c54d4b45cbfe95bf278f51692eec9b10aa9fd3227941108b42daca56a2997e2edc127659e769e98a41e73ba3dcf0be4c8838e928570870e0a8baaf628738da957f8aa2181e179c89d229116d0243c009e4924910eb4222c3592c5ee3c46a99729ab6a07c0bcf6d54beb27dbf3e6c879ebc54574a777ae912ad6af2c8d35595e60fc76beae6a358411eda38debc90161e1a3a0b75ebb0e846b56640298ec594e4b688e47c986811054fe03162f1dce6872afeb034b145fa0f6d0353cd60353db92ae72e0571e6771ff707accef9cbea2283549dcf525f5d180a0f1dee574f0da70efb8fc4a907d247ce7f564185914c216c339d52c51ecf8a89e380c181e5b60806ccd7f549cf54e2c0781b3e806209b3d077dad16c4e5a2e5f1fb64678fbcaa5542700ea2e16b6e8ce11ee31a0177970bd87a958baa58086a4f341bfbf3cea6a40db715240c2d4595086cfeaea233de1d25805b4126d268eaa52dcd272da9c9b1508aa305d6670d99948c3fdc28254b297262d224d542ef1ea670e88e5ca0cae3e67135f5cf2de8220bc927dd4c34311d617e40668b235dc3589d91129d612d2396eff77c04bc45c4c69382bb645ca9bf9bd9167a282c987b7180512413142747f170a339a3920f42ca8267822edaccda95d5fbf69f8cdde648b1b43b6f76b368110ce07fe0c332b018c1426aa36225b63fbf1d7ac731729393b9fad25b9f6373e3cf0a7450fa1ad52f4cf40e76a68a1c84aa74d88318d3bee7648b8e9b89e374e7106b4b9b9833dc4ac04e863e79cbdcda12e11631a15b784b23066f93e4aeb162180f5dc8131b928933a152a6245e09e927be019cc42fac4d52a0d637374033f1d9dd1a2b82c5e0dfbcc0bcf0deb372af82b23816de1b3b4639f668740b130d50d70148c26de70d9260adb79a40694e7179f6a57cdd3774cc01f29b6af58c2ac782ff21df53c080546e6eb64f9d00774727fdab9e31f1d889b4cfc965fb865529a399d371fe7784a24d7337ec8cffec8c65171be734bde5f1f7109ddc8d3ac8515483662c249dca89d69c7e3cd1575708c86a9c8e642e88141b5a2fc4f2ad8d458689a4fbd8857196aae818a1c412135fe61b1ed4f0f0ea0a6b23f7625139388e6401923ff4184339b453274c3eb219bec30690416c18d3cd29a5c37618eaba94d75c7193561d426daf3c5f8356fa72eb3744604ac0bcb9cb954cc0ae06a4cad6697b5af6ebf1362e013ba6f6d37448b09ff0a100cd67b6dc442450789a33f6e2be2594a4846bfd592954f8df0b17eb87e663aca1cbd73742ad5ca18540e57606879d02d2c27340e1cab094cf4912b2aa22c426f4473e65ae22959b5f184e5102eb2cd412abcb8664c891f8eeb024f8b8fbc76f15601c1df48bdcd0d8b770e65ec25ae749d057c8ae19d45cd10daa9b4691bb0f8989e7f5681be839e06af4ed46ff446f58d428f41c97d6be8b6db149675c01b2d19453f6f1e8cefb2dc80b03840220beb1e332bb6d71ee51d22e2cce0e8a5ba11f1ddb60f4edefc39e00a6c3269e43e654731d3195109349259bcf297ab25224a306e9b0fb688298ffe7c9de42f6ac955b6496eb06bfa4c266392329744b41fe72c9a9d89aba8fd630da475b581beb8b3a33aab2772aca62ca44770e08c3d55735fffcb7206099e8dc8ebd790396432bc0bd5d606be40002c5e34acf9dc4883ac7026fc09381a1e8cc0f7c048b883defa9b9281e226edf867a128afed3b52442b32de611bf5b31060301bd75d0b9448adcfd6eaf7ea24276104105e25f5567d7c5814424caa0b43e515d37711e46b39a62490a3c64d6d137d6e1e23c1544aae2a04aacb1a9eb603cba12c3dbec012f72b04819f6446520bb882cb598689c1d08f36fc924b27d0ecadf0cf67e2391f087c5bce86436916c2c94f557ae8b913ad14a82fc324cef3f583bd32814b003574dfd2877805ae481245d11fb28c55d1581854b4ea05729b70614a072b18e76dd81f38b0de38deee1dc15e2f4051f5eac2cf8530778db1ced407ab4ff0ce6653568ad52426a665dc01d3ed701a9b148f78dec7c7728f6b7a4af096aad2138191e7f25b8399dc1ce2898bb40572da37c2a3dbd1170056246bf5821ae096dbcf849c8c61e2a403b145311121aed445b3365e655b435b15cda43c8b7f6b80c69fd583a9a38c226ef7a358388640fe294e36ca7e2a1afb85efa72314f2532e4284118bc8e6bd0117a3be44fecdf0b7bd7b47045d3cd660e812035f873f813145ac38367d94a38773e87dae0d889a83d10dea07a11adb250801fca4d9789e39eadd00093a6737618c923aecac5ed1c8f70b1b628e2511f696829e0aeed6914802be51bc665b807bc12457b8935416f803be917fc9eceeb02d07cb180ddbba61aa4624500a016849d886f6513dc49de79be388ad86f97033dd3e9f5bf0508b5439f5ddd52f182687de89a790be82c93226c7a179149ce91d45751a55873039cb0498e08647168c3e72f2da8899c98bc1131914f7fc8c3d54ba0d5fc2f9fd094f1db9e5f25a3b315a0955ddd08ac01c555d0f237203d0af855a890", "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"}) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:44:51 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) socket$inet(0x2, 0x6, 0xfffffff8) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:44:51 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:44:52 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:44:52 executing program 4: mmap(&(0x7f0000008000/0x3000)=nil, 0x3000, 0x2, 0x10, 0xffffffffffffffff, 0x31642000) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:44:52 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:44:52 executing program 0: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0xa0000, 0x0) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000000400)={{0x0, 0x0, 0x80}}) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:44:52 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) sendmsg$NL80211_CMD_NEW_STATION(r0, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x48, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@NL80211_ATTR_STA_WME={0x34, 0x81, [@NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x5}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x6}, @NL80211_STA_WME_UAPSD_QUEUES={0x5}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0xff}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x1}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x2}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x8040}, 0x40) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:44:52 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:44:52 executing program 4: mmap(&(0x7f0000008000/0x3000)=nil, 0x3000, 0x2, 0x10, 0xffffffffffffffff, 0x31642000) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:44:53 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:44:53 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:44:53 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$nl_audit(0x10, 0x3, 0x9) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(r1, 0x4080aebf, &(0x7f0000000400)={{0x2, 0x0, 0x80, {0x6004, 0x5000}}, "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", "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"}) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:44:53 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x54e1}, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) select(0x40, &(0x7f00000001c0)={0x54d9e122, 0x1ff, 0x76, 0x6, 0xf, 0x5, 0x5, 0xfad}, &(0x7f0000000240)={0x80000001, 0x4, 0x10001, 0x2, 0x0, 0x100000000, 0x80000000, 0x1}, &(0x7f0000000340)={0x101, 0x0, 0x0, 0x8000, 0xd9, 0x100000001, 0x401, 0x2}, &(0x7f0000000400)={r0, r1/1000+10000}) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r2 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r2, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:44:53 executing program 4: mmap(&(0x7f0000008000/0x3000)=nil, 0x3000, 0x2, 0x10, 0xffffffffffffffff, 0x31642000) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:44:53 executing program 0: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'security.', '\x00'}, &(0x7f0000000340)=""/42, 0x2a) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000580)={&(0x7f0000000440)={0x118, r0, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x80, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}]}, @TIPC_NLA_NET={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x854b}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}]}, @TIPC_NLA_BEARER={0x70, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2000}]}, @TIPC_NLA_BEARER_NAME={0x16, 0x1, @l2={'eth', 0x3a, 'veth0_to_team\x00'}}]}]}, 0x118}, 0x1, 0x0, 0x0, 0xac15}, 0x4040090) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:44:53 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:44:53 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f00000001c0)=0x7ff) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:44:53 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:44:54 executing program 4: mmap(&(0x7f0000008000/0x3000)=nil, 0x3000, 0x2, 0x10, 0xffffffffffffffff, 0x31642000) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:44:54 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0xff00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:44:54 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) r1 = dup2(0xffffffffffffffff, r0) getsockopt$packet_buf(r1, 0x107, 0xd, &(0x7f0000000400)=""/4096, &(0x7f00000001c0)=0x1000) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r2 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r2, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:44:54 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$nl_audit(0x10, 0x3, 0x9) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(r1, 0x4080aebf, &(0x7f0000000400)={{0x2, 0x0, 0x80, {0x6004, 0x5000}}, "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", "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"}) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) 04:44:54 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:44:54 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:44:54 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) r1 = getuid() syz_mount_image$btrfs(&(0x7f00000001c0)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x3, 0x8, &(0x7f0000000800)=[{&(0x7f0000000400)="ca8e820ed029b7b2346bb647b1429031dbdd48d93c3f0d845b8f259213efad65824e6c90300ed1de2ca24b86b0a63c2304fa8f8d7d347f8da11ffbc15eb363c424102053eb89396d3b42498d75d79acb7debbda9de5a47010185d295372b443125c5035f9eb52879a7e09d231b62d03a9cb841122b53e4224c418b85c9589e728f0a5dbb49d0f12e1bb977f3bca68fbd9e7765a37a8a0a2a00da5f82143883438266da0de3a00c4869618e60eccf20be2392b352c592415055cfcaa50f8ef74a", 0xc0, 0xb58}, {&(0x7f0000000380)="37a14114a370d5cbf7d88ef2506101b20568771306adf3528daf501b96a9555ebf3ffdf75dd48a11a8ed15db4accb9dd815e95a764e2ab46c532", 0x3a, 0x6}, {&(0x7f00000004c0)="7268e713cc4ff3a70c98b8eca51f89bea9569b4bbcd2cd80f30f8c3f0a6f2a0022170509e8914e080d4bd5e112ac88d29ed0dd7b04beff9946d070682d202bada35bd1d49797f8b7b2a287c440fab0e0d07663785b8fe307c82405af3ce1b4692c8f35c4cf772932e84a36fe95c16f5673914a6abd767da60f0685b9138c52ac6a4bfc65abf8fb171cb6ce39b56a306670c14133f1db189e535d2f680b1912edc6f49897d3aad5da1bc4", 0xaa, 0x5}, {&(0x7f0000000580)="6ad9218e93470683b8460f529346bfcdaef1e3de31d36df0718256e3e6e2c951dc56099b00cf39a73a0706e09e436a02a9cdf8b0d143639334ec3fadf5697d8b86d451d835dcac053408198bab519aaf4eaf317d69b530021df4a7b97578e2bd6d261cad", 0x64, 0x2}, {&(0x7f0000000600)="5aee46d8e4b4044f1de16140a1a18f38baed148278c0e44b270a08e4dc71ef7e6e0832b6b689909fa782b6904dff0f04dd4fe4177336af919e251a0788db5a3af8acb1f89212", 0x46, 0xfffffffffffffffc}, {&(0x7f0000000680)="32890acb06477c", 0x7, 0x6c1}, {&(0x7f00000006c0)="152a380cf60719cd6d6eb7050b234386125a3387130b1eaec089bb18", 0x1c, 0x392}, {&(0x7f0000000700)="485c0db0dd99c27daea5316a91eca724f139c9bc99ad3478d0ed42aba675eda3c73b13be46d55932d79c695b941fcc89264d6472e88e8fb6c162b1729c5dd685f86b13a7136572b431443107bafec67e3a2c117a17ab5047344034a80e84c9695ba693746be92f729775586e5b75f7aa3d46fabcb6c0aa2dc1e55e8df4ac1924d11097f1784c6f30e06554470df4ae50f7bab143706e1091bd38398d18ad54806f1db9d539b2f6f9b8bcbb384b8a904b5dee734bed48e91629d0e35e0ef9567f5a4a7be192cd26a040c8ff59816b5a4e2e5ec46721bacaccd0473cf8", 0xdc, 0x4}], 0x20, &(0x7f00000008c0)={[{@user_subvol_rm='user_subvol_rm_allowed'}], [{@permit_directio='permit_directio'}, {@uid_lt={'uid<', r1}}, {@permit_directio='permit_directio'}, {@appraise='appraise'}]}) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:44:54 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:44:54 executing program 4: mmap(&(0x7f0000008000/0x3000)=nil, 0x3000, 0x2, 0x10, 0xffffffffffffffff, 0x31642000) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:44:55 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) socket$nl_audit(0x10, 0x3, 0x9) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(r0, 0x4080aebf, &(0x7f0000000400)={{0x2, 0x0, 0x80, {0x6004, 0x5000}}, "e15dd3a4877ce45c991b4162f2d9fa134f92d445e109925143d84000fc5a775b31e077e14f8899fc4a390902c8331f93fefd002878bf32190651ffb2fe4dcc9ce8b1d742477b2ff651a6a4979d98d5f63563f61c8a71e414aeeded878c307cda0e0a11ed3c658f9174d6f175f575ffb8854cf5d8a65cffa9a2b9d5f74db0bf12bd51c7580a83a727516c207210eff16f21b0496bc0c38f40133655c68a9891ee4d8de8378b23e0f91b3e9ee190ca432ab012a2bfe89f0624f3918ae93b3343ad7f83d35441e29628a4e45388062ec10a280d524f447523413f8494773c391893aa0db84b7e84f85d5fbfbbb6283dfe203466faad75dfbd49dbe4dd32952fcae0535f0993aa660101cca8d7766c2a4658168dab0d1e02a731877446ee7d08a7ab91d60f679f6a82c028ebf9c6fb7474c57e32d310e3166398210609352cc7d71eef20a962f2d5107c1ce3893055839b1b0de44889bae5ecfe411d8edb9c742095b4161f798de7ce26c1aff0876c757a72eaddbaf023cddc82f4f4826c7ef3c37e8da148e2f5d811723e72be3508a99bb343654af94b11ea79d2756167a05613218e32eb684ebfc3d368b9ccf21d748d9fd96b69ea67ef5084b9a67f53a4ea8070c1ad9455bed06ffc529f545a65ba6c6e1033f7d4562c60c65cedcb2a1f5a9959378edd4dc3a2f6f62f607fe407457d05d7c6971416ecc382ab99859fd01c90e9a9438f20d40ffcf08c1f54275f67b91f42cb5933bdb1b739581a963c206afd6e7dbfd2e0ede6cfca140d1c669e6180b3dda69f1c07e43f083413b1aabd9416ccc8e70ba9598763fba270c7fcabe9d295ee9719590ba49b42198c0a3eb483ba7d78e089cf059f428519837f81b597876f27885c0083203911ff01b0ede2e4d0ab5362be0a78bdc927bbfdf74a9f9e87c27c8dcac1a128f117c33d25bc82d44683651aa791747b083c20770dfeff754c4984844f76da32d471c0554158229a4f9ca9ea59a550f681c45baa1c74c9a3a305bdb6853ab1be7a12b52896a20b25cd29c0d78c0257fe53b2337c60db1a11cabb0980f99d1153e3092c85270a7d9834cb93c0fe2337f6e6dec1497b166a134640fb4c0278bfda34ef8216088f5aa21538a216209b1553d95c1daba29c6ae174267ccf0e175611280f4fa984589fb6f42ac195f11da000419ec7f0cadae8bbb44a33c295818816d13fe07fa25d2b76ca25f5f82ac4c00ca668ebf0037669fadcd00b24eea7d2acd1cafa5f71fc895d43194637effb6b05e161fdf9c8ac6156a94fdd2773a220db56eb2dc533231277bd77e225f0bc97b2a40dfb4d6e7b401df05368ada3627761794959af52aa73200a0060a3fedd5da8599521b1ddadce9c0d397964db7c722d7976b9dd179b688c2230a706997b13c230b885745d9e4ba6d9108f0ad1d7144278262795e300322e3258edf5e8485dd4264cc3f977457e0a380e36fcab6513887ba085409d1f01eb8408ee90a1c1492fd7868fd6716d4ac711266c9aea76c7761a3649e9d5c1f7043aabb4591dd2ba4d07576fcf8d8b9e1dbcccf159a9070a6383ec374d909af678a45e8dc2e2699184075d5e34a601c5e4950df04f2be7757745fe82812d24e16769598fdd05dc8ea176e5d716c5105e091020bfe654f7e0aa0d1674afa3864178237137e9d0cc2984d7f85bf5c1df0de40dab0efc7ffb6132f4be9a058c23fffa9b6934f27da802b9e792ccd9300841fb903289bca481fd96ba5897d19ec0919f47609b376e543a3c543474b028b739f04f9ebe72c83aa304daf4f6aa30df73922a3f2a369c46521c7e989d3593e3757e77b7dc3d6bc27b3246e7a2045299dfcda7e2f88fa1fc5c944cd64aa1b566c3a4f141bf73cb5280c3418daf25797c9317f1d2fef89d42751b284db3a9c4f0d3c1bf442baef72e259d5733dc97d90a24d3e84f8cf07ce1fef0424436b363faad3db9a0aa903aa243c574897466c401a4da1d372310ea413b4ed363aa241d9805558de5299ef55bedb6b0c68e5b6f64c65234d2b5b003f4f82148d5063e898c41f6c25633cc6a58e3fbc3b778fe52ec55d70902a439c04008079ae0ae9e7cf51ddbcba68d22994f54d383e1f23ed6b9658414d66a79b80f87def8b851607eff173aef24870ed98f2f902781f9a7d33a2ef76832c4ae2e5fec4812d542642570fd64e592ecce9913a8cb66d848f0df0703807fd85adb1ac96bd4c867987fb12035ec072047d40c1429d50a05b4623d1ef3e5d4984858eede15b07bc6010dc4c5226c2780dccfcfb185ed4250e297a9f61e0519ad3914f655034cea1a2c54dc58155ce11f4b38558f697991c885d4d265e53145a7304b5284d11b4b0360e6d40ec8b6008ad20e87b2b855851d4c80e6159d4001423f4670afa8f50e20951ce70e81821e262b5fb80e587b0e802397d97f05e65450191635fbdcea5921ec1f0017d1eae4fa52cf2035b84d061c61dbc25d5d87355b8492ff28f0cbb95bf8b74e34c376a5d3bdbe7098b995f46d67f5e6bf773aac260d57db031406888377bb87e01e3ca2762e44aa9091e106addace87246b99cd1a8469779ccc8f5d33b179f9210393b30995fe5c1860262c6039363f43c07d4da358b62846507d0a7fb6dc19770e4284920a109292e3efa5717132ed38574cab52b7781622ce0486df86767a1f7595bcf6eaa5d7718749338c1f7eedbc25bc3fdaafed34b224b650dc693a3b9509d673041bfc9ed24712a8fb28d9626726b989fe826f51fccde1a338c61170b9d65c842df03675964d0029ebb86e260ce16ad2ab16a741b6fe9bc04533879186bdbe86fee154b879c05174cd88b020a5f1ee22080b3c105c848cb1b1417f74c7b2eb6d5ef97aeeecdea19148b7681c1586f8485a84c1b369ba026afbacf08128b53a90e0f378b0befed7be0181c9a7ddb8283f46b0ee84b2982cc2b54c57c4a50037405b3c1eb9cb6f5071507188325fa5176a1d824d0ee4f658de7ec0b836577eafa1d4b2324557d778ff03268916486e76744841396f7fdaf5c5e8d696a3ea9d3cdf9821508cbeed34dcced0657e7da0f56e17d2056e42464fb1cc0bd19f23a82ddc86aebc025d882fbb043ea7582e7bdd6fbb5c09dab383c3d8aa08ed9e84d44d3965ce5221d6ea0f3285cf70078ebff00abe41e78c78e2371a563f95c73c69c3891ee36c37aa309063451906ec77b80266b74a33d889940c54d4b45cbfe95bf278f51692eec9b10aa9fd3227941108b42daca56a2997e2edc127659e769e98a41e73ba3dcf0be4c8838e928570870e0a8baaf628738da957f8aa2181e179c89d229116d0243c009e4924910eb4222c3592c5ee3c46a99729ab6a07c0bcf6d54beb27dbf3e6c879ebc54574a777ae912ad6af2c8d35595e60fc76beae6a358411eda38debc90161e1a3a0b75ebb0e846b56640298ec594e4b688e47c986811054fe03162f1dce6872afeb034b145fa0f6d0353cd60353db92ae72e0571e6771ff707accef9cbea2283549dcf525f5d180a0f1dee574f0da70efb8fc4a907d247ce7f564185914c216c339d52c51ecf8a89e380c181e5b60806ccd7f549cf54e2c0781b3e806209b3d077dad16c4e5a2e5f1fb64678fbcaa5542700ea2e16b6e8ce11ee31a0177970bd87a958baa58086a4f341bfbf3cea6a40db715240c2d4595086cfeaea233de1d25805b4126d268eaa52dcd272da9c9b1508aa305d6670d99948c3fdc28254b297262d224d542ef1ea670e88e5ca0cae3e67135f5cf2de8220bc927dd4c34311d617e40668b235dc3589d91129d612d2396eff77c04bc45c4c69382bb645ca9bf9bd9167a282c987b7180512413142747f170a339a3920f42ca8267822edaccda95d5fbf69f8cdde648b1b43b6f76b368110ce07fe0c332b018c1426aa36225b63fbf1d7ac731729393b9fad25b9f6373e3cf0a7450fa1ad52f4cf40e76a68a1c84aa74d88318d3bee7648b8e9b89e374e7106b4b9b9833dc4ac04e863e79cbdcda12e11631a15b784b23066f93e4aeb162180f5dc8131b928933a152a6245e09e927be019cc42fac4d52a0d637374033f1d9dd1a2b82c5e0dfbcc0bcf0deb372af82b23816de1b3b4639f668740b130d50d70148c26de70d9260adb79a40694e7179f6a57cdd3774cc01f29b6af58c2ac782ff21df53c080546e6eb64f9d00774727fdab9e31f1d889b4cfc965fb865529a399d371fe7784a24d7337ec8cffec8c65171be734bde5f1f7109ddc8d3ac8515483662c249dca89d69c7e3cd1575708c86a9c8e642e88141b5a2fc4f2ad8d458689a4fbd8857196aae818a1c412135fe61b1ed4f0f0ea0a6b23f7625139388e6401923ff4184339b453274c3eb219bec30690416c18d3cd29a5c37618eaba94d75c7193561d426daf3c5f8356fa72eb3744604ac0bcb9cb954cc0ae06a4cad6697b5af6ebf1362e013ba6f6d37448b09ff0a100cd67b6dc442450789a33f6e2be2594a4846bfd592954f8df0b17eb87e663aca1cbd73742ad5ca18540e57606879d02d2c27340e1cab094cf4912b2aa22c426f4473e65ae22959b5f184e5102eb2cd412abcb8664c891f8eeb024f8b8fbc76f15601c1df48bdcd0d8b770e65ec25ae749d057c8ae19d45cd10daa9b4691bb0f8989e7f5681be839e06af4ed46ff446f58d428f41c97d6be8b6db149675c01b2d19453f6f1e8cefb2dc80b03840220beb1e332bb6d71ee51d22e2cce0e8a5ba11f1ddb60f4edefc39e00a6c3269e43e654731d3195109349259bcf297ab25224a306e9b0fb688298ffe7c9de42f6ac955b6496eb06bfa4c266392329744b41fe72c9a9d89aba8fd630da475b581beb8b3a33aab2772aca62ca44770e08c3d55735fffcb7206099e8dc8ebd790396432bc0bd5d606be40002c5e34acf9dc4883ac7026fc09381a1e8cc0f7c048b883defa9b9281e226edf867a128afed3b52442b32de611bf5b31060301bd75d0b9448adcfd6eaf7ea24276104105e25f5567d7c5814424caa0b43e515d37711e46b39a62490a3c64d6d137d6e1e23c1544aae2a04aacb1a9eb603cba12c3dbec012f72b04819f6446520bb882cb598689c1d08f36fc924b27d0ecadf0cf67e2391f087c5bce86436916c2c94f557ae8b913ad14a82fc324cef3f583bd32814b003574dfd2877805ae481245d11fb28c55d1581854b4ea05729b70614a072b18e76dd81f38b0de38deee1dc15e2f4051f5eac2cf8530778db1ced407ab4ff0ce6653568ad52426a665dc01d3ed701a9b148f78dec7c7728f6b7a4af096aad2138191e7f25b8399dc1ce2898bb40572da37c2a3dbd1170056246bf5821ae096dbcf849c8c61e2a403b145311121aed445b3365e655b435b15cda43c8b7f6b80c69fd583a9a38c226ef7a358388640fe294e36ca7e2a1afb85efa72314f2532e4284118bc8e6bd0117a3be44fecdf0b7bd7b47045d3cd660e812035f873f813145ac38367d94a38773e87dae0d889a83d10dea07a11adb250801fca4d9789e39eadd00093a6737618c923aecac5ed1c8f70b1b628e2511f696829e0aeed6914802be51bc665b807bc12457b8935416f803be917fc9eceeb02d07cb180ddbba61aa4624500a016849d886f6513dc49de79be388ad86f97033dd3e9f5bf0508b5439f5ddd52f182687de89a790be82c93226c7a179149ce91d45751a55873039cb0498e08647168c3e72f2da8899c98bc1131914f7fc8c3d54ba0d5fc2f9fd094f1db9e5f25a3b315a0955ddd08ac01c555d0f237203d0af855a890", "04689b6bd2d316610bbfd1273e80ec44da2305994c84cbea757c8f6cab42e851aa54db351c3e4c42427ce4b0c496463a79da7369c29b48e81e6e0218f3c52c3e10fbc783c37903c41be917275256a12e79c6f8e258b2a0dd522520042a5f68dd89c809919f246670fc4863ce88e568dba3017d1c49ee0f362eddb93921105a962cbf92112c71ddb9863322933da84676356a32abdf3490839c48d18cc7c7a1e6045e8e7d16868701e7175e22540e52d101307aa0b4df639e4023bfa7a0a18eab5add22984afc0b1c56b11ec3392dbb3b6709bb0ff6ba00b879e09f041d6e233e9ba5a27767fafdd20a2e3ca860f23a07a079453ad22b4ba21adb0b583a0ce6735a23fe6eef715dd876a8b924d0291e42eb310c17950f9127d2102118e796a29a4d47dffee2154bea15b5b8a4bfbc54023fefaf0f9a02930078f3d9bff38d4d3df2854471c1fd3580aa445e7d4e764e904df28faaf06b5ca473d448119983a5c6605dee3afb14410bad639f5ce87a4c47e804a0bd01e4f734d70ac98304815860efb75c409fb0c7596ea51b401402e9e43e69d071b2a6828a6cd7b3415d8a40cf59d31802ab72db03fab512f43b928d8e0294ce3f333e68d9205080880203fbbbe5815c60bc7b441ba5fc3605232ad6cf1ada190bb0479ada0858829b75b90b76e282ad1e54f75b173d16690f69304a6d1c1564db013f6994d64801269e20f842bce419a318241cce0a98c4a6d245f513077c90798680ba2c6a4b000bca299c21de9b7b9a1ffa81f9ebb9404fc070333b575f79714e62dd0ec060568da0ef5c249731ca4d6fc0a546161989379dfc394f02475536a9e13a407900ecefdf4f0a52f9e95d617d07cc676345fc869286c780ea66f63bbec7ffb6883dd04b9ed0cbf79bc439bcfb4e2739b0bcba8e194bbbd23b62201edbe798e5c871be0e064040f9df05ed94eab56b9e7383fe0598ffb8b99552b570b54c502d291ab93d54a36f16570c256e639aaf6521831f096e6ade9ebd629da54ecbb172f95e3658167dc0028facec457d8d00210d2bebc044bb2f40e1142d8d53e47af75f0ea331d60b174ecbaa937a61894150ac346a5634f0f1f9733785cd827bc25df2ca3f654760f04ff12915da75929d11de890e39388565042b99ab715520b2fada8bbd5ebde4aecee0fad6e06b4c34e83dfc09b780dbf7fd9edc6b9c79ba62bf222171c343846f947201b644a706bab1e83225bd18fe92f5840601f3710f2f9e78855de31d342015c7ca65d95109b1146c40e19008f2d30be64bd4d4be8f4f9f2d8a7bad1c6788ad577fd4e21b1167432a26ee0c8554d18eec6fafddff475adf73bb9597893ec51917848db185f658fd91c976a2b7a1ea581bf8c927525bce866feb07248ac6cbcd5519a33d5516252018159f4a5b0062fe6b5f1d9eec00186cf8c06d494a848b8913f916d9ff2ee874ac7203dec364991ae39ae9c7b8ca6361a12cbd6d592facd77bcf984149c697675928d0628f1d300a2a0a35c521106ca66a602483f343fc4786d9b8ff68b037ef10439a278f0751cbe444d5d820d5e10a303f22a7d7781db3e1b78084c196896d57e7c7440839977610037a3dc5623225fce83eefe6b41f7090ffa021edf3081a58b9d41e54506f7874403bb43c2e187175c3ce828064176b3cb099439564d665b9b7c119a956b78bf5acb57dc45651e1431615ce5c8fa7ca774ad12de5ccafbd246f42271e51beb0800ebf4b7884ace03b621415738398861d55b4c5757a957f42297a216f4698063076377e24eefcee91d623a68a9bf9410458f30854589e8bf0f6c60548033e21dcc96acb25505c118e66b05881337bf12609084d62672f84e5c0362bd738ce693a1875e60dfa3891c68f81e6e04f20bfb71750b252223179d15621693f2383dd5bb3660be4e2a897feb4747132a6561d7578be376261268d3f9b955798c87191eb6685020083f37b38974c0fa5f988889f25ddefcf637410ae0b2276754cb84b0a3c71f641a0ede3a516179202021f50724b20a7007016556e7e7a4e5d7762b547a84d12fef724f8862b7b059d19ea2a8cacf15d847f07391468d32eccee842cd1793d433d146b274381535f5c3e66867ae5e71055299919211df21d07478f7ed2f12a7354c41ac30abed69688f8f4f0860459538f8c32261580e3a9fb5b2ae6b0b336f34fae371247858e4f440e1c55a6697aefc17e4deedb050868f96c8c96e9ef305ba930ed9e70ece4c0f2a3062382dd55cbfd321a51a666dadce6424e8b1fd5b63db26b8f293a3f9f6bedcbad97d7718d6639cd565409029238d5ccc03ab75f3f7601c5c2c7bafc08ef8644a0ed6083a8cec997eb4ca408fadb2dd503b393d4ebff003c09de71d38e16ba71933f24c23bd9a77990fe27403ea79954ce03944723417de17b4795902652c67a2b446cc72c0ea887657ce04e6f833e358ffb2d06e9b7bfb6a403215258bae3ec5f152b729a2b36452ec3e018a0a7afccb6dbc7b699243f6e9b0edcef9f72811fb2cb2f6b35bfd72a29d37acbd780ec4083e99d3b821ea9e16d753c2a4e4039a226a13082e11bbffe6c5b828aacaca002be9c6365b5f3746e5e8950f01b7ceb92f3a9ec9eb4a5d53eb02fc8ea0d54078baa369aba5c7abaf920ac27ca0c6578e08452e413dd0a9551f67f200045e86f2bec8961413db2b695dfe5bbba5b136c50bee743bfaca1dd3149a888f027e02854adda05d66ab5c80229b1dc26eedb2b4d95bbcbe3873e2231b6db35923cce393e4feff28acd20bc4f108fb29cb1714df071437c527f85a2a36fbae22ae8be1a380c16aaf1ca2c919b039d132c5d147dc7be2f210bf6b91a34c7530e44c8cd079c3769519d68dbcb2429d4daf8aaa3aace1c2926e75e9a9456c4098c563efceae4d4fa737c7d33b7fb23b0fef5d17599d76a0f958f98069db01a81de10591b2ebecef71a6ec51e302a26afddd5e909eb068939824b760a1d0d8780a6430d23c37a10c59b16110969ef01baee9f80964cfb7b303bf30deb07ec1f352c0b7308c1a2c735061b062db9cc633e05af5089f68b8192f3dc31fe300483baebc3225580f8e7a8d6731a56d2cbcfb9946cb11a832e7830b75ba167e8e353cf18b702d51d79d9b590812039a9b15bf01bd4fe2a99e7d627617ff006ed13a41a9144d4863e0e2a29a3bcc9804a656b29b7ea1a6f02ba256c9a53c093c47de8a8a50e088ae9817b51040c0af6f6241239269d5a833f9bdb5b2b8d7610545b235015199f44f878d2b0714a29db7c109e599ab2a80477152841c1a08b26bb1c7703fe6d7910ab29d297167f4658bd42b43cd336cb3c078ed4fa6ab49afc645fee07c77d7c99d5a2e250f01c6fb679b81b647045b58f4275464030d0d6e93393c37c86c51f6dd6d0e4186bbd12b7cc75615b607b4badabe744f8b7e737c62c2528e5c9b25bf08cb528e4f8a8cfa56d8f8dd3aa06400de774a2d3468b18f09483fb98a3a2c1b8a52d6513ea13d65b6009907a99241c7bb6a1cbbdc86e8cb68ba0317cf160bd6d56867037689e32a79bccf860d4ed5840d6fcf56de8505ea7b1940df31adfca42c3b0952b4205098895ed2fc5ce94e933d87f3c46358c4a2c28ac0048cc636c94c18e8acde5f9ae336065ead5ecc68aed3569bc4e03f0d0cb7febcb80848271c33d832cd3338ccc1dc1beba8b305c82f7d86959f3a20d39618c8495c3809c03d2d83ff72698d39065208e33c9ff72212668f1cb08384eb6040d3dc1a7bbae42a073166fbabdae038de55743c272583bb94440e07aa704c3af68e7f63f6cba96796b79df5f667d0667f153d505bbb2bb47f716efaa306fb3ecb2f5103316b8290388f7393eea589482df963ee93724390db4205ea107f8ffdd47803fbc850c2ddd1d7dd7d2d9cf9c4582efde362b41eab4f9d71964139a9d63ab1f87e424f642d939bea5cce103a63072814ea260cbf94e713ce14c87e46cf26ce8bc477cd16a06adb134ccc856c5f3de839c1b1dca8d067b97b5ec4dd6009b46057f7c1ac14dc9fb5f935f0acc701b30ea15826b9ef1737e63f0c726f31f909aaa66609938e76c7853bb5effac032f859fbdbc61db1f426db39a23b30fe3e5c143de49e29eb7199f3aa13c5261293314ab965c5a64b3bab69b58315a48d4beaa5d5b4230ec68e6e317d8f6f9ee5c80f11d23ca7537f69e083f74491301796bc6df5a9d83374c90e9d966dfc69f262ca5ce598078cc476b79cf386a0ec141c815a312c5af579210dd9839c95e19afcc52a9dba038d0b9d8c561758eba1196c96baad5a7e88632776922bb110de33f0bf338f231ea6404294ddc92eb57faf33ab46e19f14522849e7cd74fcb605d3fcdfbfc63556c984c21a8786ffd3b540c51930fff8e7cda38e38ceccf1e8b807d9b683f655369730224c6f1cd7baf697322af3ede306236e1b524138e33cc2f7cb57ec96f35f4826cbfebb49af0ea4ad92cdb86e78920cd6fe1d1f881801c6242434aac19ca0f6d8bec835b89a42c232ca91fe02c1adecb27f03de26e8bbe2665967d65e88b9fb2e3404f3d0b7a04334fe80587e0a4677909cfdeff650d1da4669af9faa85a0fa45eb482b4e29e2d7da4336a6776142fbb6cbb82e989f518124e271f5965841dea10d750bd13e0ce22c818b349e9475acf4a2552a5c0dc0bc078871c41b0905aa4cd2a8d58cceb81c0d0f200046b09e914678d20871a7d43ec7cd2d0f25750167e2f39bfda7857c45f3b874d3ab9e96299766a9e7f4b48ccd79a8f4072462bcf668e31bba550e2b929e328bbef23894aab4c3be26bbdae7e5599e6a3fde13ffc5b8452f2056015183921e89e3a10eb075f89197120816246b03db7af78a10454add3eb7987e4cf571cfd8849c928338c5c36874b16ba94719d3e5d94346397b9d03fa6532ea9957fdeb70040e4c582c4861e5b940a9b0a270862d587c343428087bc77827823191c008928ded8438bf9c6bdfdef24f035ff57b0b9df00c3d078e2752256db1be33dedd1f9847a9b957086d1f4ee29b40dcf2aa3ba35d7145e7f506e5364c7efd4dd852c3f6677de34c8a735b703f338938ba7ed75c15984e4d63180e15c59f1283e85b49276e3b707a7a88e0dd2f8a4d670742c8e3029dbf1ba1c713bcb140e055962a0063a151a2fb102ddf85376b75ec6f934d761ad210eed4ed49a17745615a8718f4e54bdef266180fa012941d1c07358061de502907d8453803292e01dbcb75301d1c7af061dde8c9160d748a66f4fd5b866c8ae1d92a78e80fc79189169fde4bfee9c7264c5cd9a8564bae26276c5fb9336caaf1aba0530460a0f2ffb855401343e5b6f4d630ff0688d6f04f9407b5e44d3d4f7a353f885b3405879c91c582c00cf990b1ba19ca0d3b305c567d90aa3834f5e6d063a4753c72031f9a4b8401e13a941157c7bd8881f4c52cad40c79441f263a0fd1eed8265bb76be59265112fdb58dc376eb49f43ec03cae64e0a3b8dadd4ebdb68d4f2b880dfcbe5d972f9398cdfd81a7135c10541c3e08cf11ac5d2e9bd47eaa574d37f2c6b502062381f96ec35dbccb70a2255dcf52131f19a0225446040ac0d06a591b9b9dba1999620afdf54589eecf316fbbe1fb1dd28ea9351e241430ddad6846cbe4c05282b5f9933fe7355eb37673df4c9626737c710be97cb62ec7db2602152ec776a1af87aafe7e43270db9b21198e49b72a9091413692b9e4b6fc73a111e3dbe21553d3515d79e78d9dfd2b2faf2e0cfe57130e3ab9978a9404fca2d472dc4627e1af5be6"}) 04:44:55 executing program 0: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10010, 0xffffffffffffffff, 0x6b852000) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0xffffffff, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xfffffffe, 0x3, 0x0, 0x4f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) ftruncate(r0, 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) setuid(0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r2) mount$overlay(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)='overlay\x00', 0x40, &(0x7f0000000840)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB="2c646f66745f740a03e409410a67fc1c385a3e5394c79894682b8f963a670e2b5bea581727254e1ad58fd554c37a83563f85a4794c9f6e131b6a0a22f1204b8363872fbbf22c1f4fa33fa3475d6b30562552fd9b11dc0605ad890d1234a3751cadf85e0689c6bd23f672aa0210af116ecd09bd41ef8f3abf6abbccf25d55fecaf7d6b0d7786c2f7328062cc3bc8d639bfe420ef453fb11962c9c4523aea8ae4b668d178a3a01457fd254bcb2777bb1ce36ea3aec0d6980cfaec39a528e3cf7eb2994101e938aa1ba35aef2e34b11125bbf6f64a42e68e8328f502223cea251a2e8b7cac20949aef4", @ANYRESDEC=r2, @ANYBLOB="2c667331a3d3263d2c00"]) r3 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r3, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:44:55 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:44:55 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:44:55 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:44:55 executing program 4: mmap(&(0x7f0000008000/0x3000)=nil, 0x3000, 0x2, 0x10, 0xffffffffffffffff, 0x31642000) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:44:55 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:44:55 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x24, &(0x7f00000002c0), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0xfffffffffffffd9f, 0x7e, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x2}, 0xa, 0x8000, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB='d:\x00\x00', @ANYRES16=r1, @ANYBLOB="00082bbd7000fddbdf25050000003c0003800800030009000000080002000000880208000200000100818bd95a00b50000000800020000100000080001000100010008000300030000001400038008000100ff0f00000800030000100000"], 0x64}, 0x1, 0x0, 0x0, 0x4001}, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f00000004c0)=0x4000000) r3 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r3, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) [ 1457.465863][T23778] overlayfs: unrecognized mount option "nfs_exportõ n" or missing value 04:44:55 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x2280, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000, 0x71}, 0x0, 0x1ff, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x8) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:44:56 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) socket$nl_audit(0x10, 0x3, 0x9) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) 04:44:56 executing program 0: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f0000003fc0)={0x8, 0x3, 0x6}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) recvmmsg(r1, &(0x7f0000004080)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f00000001c0)=""/41, 0x29}, {&(0x7f0000000400)=""/136, 0x88}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000340)=""/95, 0x5f}, {&(0x7f00000004c0)=""/33, 0x21}, {&(0x7f0000000500)=""/139, 0x8b}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/54, 0x36}], 0x8, &(0x7f0000001680)=""/174, 0xae}, 0xdbc7}, {{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000001740)=""/221, 0xdd}, {&(0x7f0000001840)=""/149, 0x95}, {&(0x7f0000001900)=""/199, 0xc7}, {&(0x7f0000001a00)=""/68, 0x44}, {&(0x7f0000001a80)=""/235, 0xeb}], 0x5, &(0x7f0000001c00)=""/202, 0xca}}, {{&(0x7f0000001d00)=@ll, 0x80, &(0x7f0000002280)=[{&(0x7f0000001d80)=""/180, 0xb4}, {&(0x7f0000001e40)=""/35, 0x23}, {&(0x7f0000001e80)=""/74, 0x4a}, {&(0x7f0000001f00)=""/183, 0xb7}, {&(0x7f0000001fc0)=""/73, 0x49}, {&(0x7f0000002040)=""/106, 0x6a}, {&(0x7f00000020c0)=""/64, 0x40}, {&(0x7f0000002100)=""/136, 0x88}, {&(0x7f00000021c0)=""/82, 0x52}, {&(0x7f0000002240)=""/12, 0xc}], 0xa, &(0x7f0000002340)=""/227, 0xe3}, 0x8}, {{&(0x7f0000002440)=@ipx, 0x80, &(0x7f0000002540)=[{&(0x7f00000024c0)=""/66, 0x42}], 0x1, &(0x7f0000002580)=""/242, 0xf2}, 0x56b}, {{0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000002680)=""/116, 0x74}, {&(0x7f0000002700)=""/16, 0x10}, {&(0x7f0000002740)=""/215, 0xd7}, {&(0x7f0000002840)=""/133, 0x85}, {&(0x7f0000002900)=""/104, 0x68}, {&(0x7f0000002980)=""/4096, 0x1000}, {&(0x7f0000003980)=""/124, 0x7c}], 0x7, &(0x7f0000003a80)=""/96, 0x60}}, {{&(0x7f0000003b00)=@ax25={{}, [@remote, @bcast, @bcast, @bcast, @null, @null, @null, @rose]}, 0x80, &(0x7f0000003bc0)=[{&(0x7f0000003b80)=""/3, 0x3}], 0x1, &(0x7f0000003c00)=""/202, 0xca}, 0x9}, {{&(0x7f0000003d00)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x80, &(0x7f0000004000)=[{&(0x7f0000003d80)=""/179, 0xb3}, {&(0x7f0000003e40)=""/236, 0xec}, {&(0x7f0000003f40)=""/89, 0x59}, {&(0x7f0000003fc0)}], 0x4, &(0x7f0000004040)=""/48, 0x30}, 0x5}], 0x7, 0x20, &(0x7f0000004240)={0x77359400}) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:44:56 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:44:56 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0xff000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:44:56 executing program 4: mmap(&(0x7f0000008000/0x3000)=nil, 0x3000, 0x2, 0x10, 0xffffffffffffffff, 0x31642000) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:44:56 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:44:56 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:44:56 executing program 4: mmap(&(0x7f0000008000/0x3000)=nil, 0x3000, 0x2, 0x10, 0xffffffffffffffff, 0x31642000) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:44:56 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x0, 0x800000000}, 0xb18, 0xfffffffffffffffc, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffff7fff, 0xffffffffffffffff, 0x9) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000001c0)={0x800, 0x100, 0x4606, 0x2, 0x9, 0x10000, 0x6}, &(0x7f0000000240)=0x20) r2 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r2, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:44:56 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:44:56 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x4) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:44:56 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) socket$nl_audit(0x10, 0x3, 0x9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') 04:44:56 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:44:58 executing program 0: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x2) 04:44:58 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:44:58 executing program 4: mmap(&(0x7f0000008000/0x3000)=nil, 0x3000, 0x2, 0x10, 0xffffffffffffffff, 0x31642000) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:44:58 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) socket$nl_audit(0x10, 0x3, 0x9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') 04:44:58 executing program 3: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000500)='./file0/file0\x00') r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0xff, 0x0, 0x0, 0x0, 0x2000000000, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0x2}, 0x100, 0x1, 0xb, 0x0, 0x7ffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000280)='./file0\x00', 0x0, 0x1, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) socket$nl_audit(0x10, 0x3, 0x9) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm-monitor\x00', 0x42, 0x0) r2 = dup3(r0, 0xffffffffffffffff, 0x80000) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000004c0)={0x2000, &(0x7f0000000480), 0x8, r2, 0x1}) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') move_mount(0xffffffffffffffff, &(0x7f0000000380)='./file0/file0\x00', r3, &(0x7f0000000400)='./file0/file0/file0\x00', 0x40) read$eventfd(r3, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000240)={0xfffffffffffffffe, &(0x7f0000000180)=""/52, &(0x7f00000001c0)="e922aa0b03591f534d74", &(0x7f0000000200)="d583a42380af6c8c79ccdee13dc497b40687e2223cb4264b598a34614b6c3a41319c85bb10d210838c", 0x6, r3}, 0x38) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:44:58 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x2005400, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:44:58 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) socket$nl_audit(0x10, 0x3, 0x9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') 04:44:58 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:44:58 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:44:58 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:44:58 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:44:59 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:44:59 executing program 0: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') r0 = gettid() perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x100, 0x0, 0x0, 0x0, 0x7fff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r2, 0x0, 0x0) ioctl$VT_OPENQRY(r2, 0x5600, &(0x7f0000000340)) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) move_mount(r1, &(0x7f00000001c0)='./file0/file0\x00', r2, &(0x7f0000000240)='./file0\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r3 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r3, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:44:59 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f00000001c0)='./file1\x00', 0x80) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:44:59 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:44:59 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:44:59 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) socket$nl_audit(0x10, 0x3, 0x9) 04:44:59 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:44:59 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x7, 0x0, 0x50d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x120, 0x8000000, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) read$eventfd(0xffffffffffffffff, 0x0, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000380)='./file0/file0/file0\x00', 0x81800) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) accept$unix(r1, &(0x7f0000000400), &(0x7f0000000240)=0x6e) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0x5, 0x8) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:44:59 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:44:59 executing program 0: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r2, 0x0, 0x0) sendmmsg(r1, &(0x7f000000da00)=[{{&(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e24, @multicast1}, 0x1, 0x3, 0x4, 0x3}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000400)="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", 0xfd}, {&(0x7f0000000500)="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", 0x1000}, {&(0x7f0000001500)="e659fb39860b018440393a3c7c7903b07b3af618b6522dee61fd2e7f5bd861f9c8cd7837193d0962346240645ce636a7aff6986ab49044e872515d0087b7efabedd1d36e2780c19bbc949e230e3b2ac70e047c0228bceb4b6788da398b964d8a053e62ded724e7e9246478a01453eaa8c28b18562d1dc8ebb0a8bb585bee682b0028f7dfa1cac046dd307768b6c074ef1eb6822cb3fdd49e6d64dbc4ef050c4d1386a4f4d0e195a6a7067bbd5327316553d4c0c18413025ca8b34eb6425abf68", 0xc0}], 0x3, &(0x7f00000015c0)=[{0x18, 0x117, 0x8, "502dbb"}, {0x88, 0x116, 0x200, "52112f05f5f92c34e3fb96e7f7c5b3ee7d5ae9c6eac3c6512772208f57ddd8968d8e2be98d86b965267fbaf7ca310d898c5dae75b583011244bac1779829a0add762c52b80ed56905ec86a5584009e7da3fc2ec820f2416558b08b4093a5a9b25215472bba6fd0c7c87a81aef8a2fc2a9167c94ee28726"}, {0xe8, 0x84, 0x8, "4159ae0ed40e7a55e16439d402a96ddbc1703248e06fe6411da353cbf60ce31e1ee9be2864faac2bc7e20d123c9c1bf6574356aa317da73b5755b4bae97c45d5a1187c9cd535d32dd059ca2372c004d900b6683d8ea633fcd8e5436d95b6a94fce3ed151e03eef06591024d723c268d22323b3bcd03e99ee2c71ba76ee8272c1bb344607362a8df49f155b9a571e1e810f160e81452508f1607fbe98525c1ef338baea52ef2fdaf40e4d7458bbd395e36f5465c7bf52892c692de5a808588ee52443a891803cc3888e29e9254a4bfa862001c9"}, {0x10, 0x0, 0x1bb}, {0x10, 0x10a, 0x3}, {0x1010, 0x110, 0x3, "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"}, {0xc8, 0x118, 0x101, "f9d40f0c927adeddd48c5d4b71efdfc11a9a17646dd165abffcc97a5540ce927eedca5833fe4cde2dc3915cd2323fd0d46e653f405c4e76e84b754454cdc94eb55a02a92df0a983e8d32ecfa35256815d56d3a4218e53bfed3613203ce66ddd2089133587eb09cb8dbb180bd35d8e7138e9d5703acbdd857d07238f7793454a01aae76f40196105899197f914f598a7f1b2e8b79d294cf5d862a42c509a50dba700fe20981d8ad06412f92ee6196de9d1d38ca0f"}], 0x1280}}, {{&(0x7f0000002840)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000004d80)=[{&(0x7f00000028c0)="733196cfe05d0b1fbe7c868bd52be623ffb40a1370c4c9917412e144e86150b3426a93fe59708c45ecfbd32f78703a6ba49dd0243064d8cf950568762f049d6788354c1a6996297f1f41eee327f028dd5c898ae6dd067356188970c2afcbc366836e641f0905b7b91048b1a878d6857da6f55cd4a589ef5f91ab585bd1a64aa34454954b35568c1fb9b47df032840d3901e629474edaa5ea5b78e88fe38d2819eec640dcb94080573ec756180519dc0eef43abb61f946bdaf85279f32d710085ca7763309f7e389e66944710d737349f1ee1b749c3f6c653d9453b654291fbf897", 0xe1}, {&(0x7f00000029c0)="20e5581ca105e3aea98b2f00a6131993e0da0a303822f0752681b273c9c3a21e71f14dedf158841bfeef86b7b7eb5349be380ccf566705212cd738ac39d69faa9279d8e1a757922d8e3a241f7705afa6ec6500c57e6898ba826a1231f77d5312de396288f2d3621c2676e36a852165380ad9e594d55b39c910d1d840b78295985a51981ff3e4d2b87ba876c5cefa4f4e8100597722eb4a40dd174772fabc4d05c051e9754ba518579d8f0ecce2d416f22c6d54cf1c6dae52003e178818debbb6a4994c94ca1d9382a748fbfa7e99c50d735e948d4066b533bd8858c1dbd220e5cced", 0xe2}, {&(0x7f0000002ac0)="059960472276c56c39fc1a85e5ca143351e9e83a6a163f385d6ee936bd2cebbbee1ba8a085a9e1339596041424b4bef9730e75e20209df9c5eeeca149d0fe2174bb08dcd2a2d6f4b20941457696b824291723391f3f11dc80f856cc85087665ad68334ada6a9cd7c965cc9ed58827eee62c7a11098bcfccc7e46df38dac797a41c85d18492c471c2bf9b20b4310e9dbfd1863070da57569b1cf1469515f8a3105ce70ff5f7f5d8f4c196055c23e20d31d429ba1acb5cb93061f8a9bf0d454673f61bc2b11883ec0fcae17e6999207f7bb31c485b3bf797", 0xd7}, {&(0x7f0000002bc0)="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", 0x1000}, {&(0x7f0000000240)="59707dd3af7270bc4618c83ed238f882288678a68c71eb7cb2d58be79a7b1292efc9", 0x22}, {&(0x7f0000003bc0)="b62267dd2d6eef65d05e3131ee864116317c9a6cbe29f54da76bd81b7098ac37f0c29931c4eefd68a437eecd3080a42f3226542323bb8947f9f2dc603b5dfb3881f37ad047210cdd37d301e3a5c4227bb3c6debc95e96b8201df6a1e89f4bdf6f4dc4f2f28fb8bf69095c688d77f13829363ebf2f16b2ec76384ad593b441a76e49f33c9a12cb28b30f2abfdbfbd11b19d4d521f844a5f18264b8d755e35959b178a30bdd8ddda0cfb00654b6057ab825c6a3e92ab6681b5fbc4f6bb7075ecbc10f86461315065673d1e1b4865600658d92396c2dc9af8ab41d3", 0xda}, {&(0x7f0000003cc0)="cf791483a466c56f98e9ad1295d0a8d2b5dfeb266ac76683cfcb7482682c3bbe214f78303d3d46e47ca5ca172d8f36109687980071939f3ddf5f50f22a2465c4d89df2221b168c976179f9678f44dcccf947a1f9501f41d580fa4197cbdb4f58843bac419605a15cf5e59570389b1e528f30d786334c435fc6d2e2650df3811ca5e489d428471c8542c9ea6ac7", 0x8d}, {&(0x7f0000003d80)="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", 0x1000}], 0x8, &(0x7f0000004e00)=[{0x100, 0x84, 0x18a, "8dda55b7fb9501e7a69cc58aaaeaf2ee8fc314fdc1ed22ed77a8100e290f2f014a69c964d9f3a41e9fce1ea5a8e9d8061c98335917a3a8f44435b6e607ef8bc21b06cdeeb737587db7bfa1e750c2f6632474c9c274391570843c26838f0ee93ec158b5d08ee63c9852210c13c1f07022e19160210e9301b2417e6be3da5fbd6e3fa35746635fe3c092b0c00724e4bc9b411d74c681cc647cd9578876bcf925838d894a10d52b7d400b350f9e5120432842853cefd4fc9bb2a7780b35165a870da40b84691de9cbfaf870b484a3a6c76103f3d7cce557455770d656088bfbefdc1721023b9d65e19b95afa5cc69"}, {0xd0, 0x105, 0x6, "e124940903d60c8498db3f94c68b955571358b062b836d6d5d122f3e20e4beed3bd9ebfe53d446e6322c3862aec33d5bcd3a4a5656bc990b41e0ffd3c066da8d8ccc452e391e55ac6efa61097cda5c4d8f3da420e104fb01a17ccc315a66d70a2f917cd849335d26d328ba4662e390dd65749ad36bc9d624494bb2799c86ce80da31477d275f6ea35effc849c3a8f8db46cb8452ebe5d76b7e7620769a1007bc12b706478bf7f4be2bcf66fc22ddce5d4f73aac0a507e4186b"}], 0x1d0}}, {{&(0x7f0000005000)=@llc={0x1a, 0x100, 0x80, 0x0, 0x7f, 0xff, @remote}, 0x80, &(0x7f00000064c0)=[{&(0x7f0000005080)="d6b7533e6ff01f699d3cd8872e2937b38f1a78c5d12e0cf23c27aa65219785e370abf44323e8d73c465a2023070e864d6e825665b947611841055dd71a76f7cbe2e06d742563a500e3f918c7e3344645bfff9c9461eceee81dee0fea1d6a052f7c4fb16d2c1079a66b7bc0bbb1d79d7db9fa9af9f889b9125c948c5075cc30df53", 0x81}, {&(0x7f0000005140)="28e4f49fb5e3eca19e6707761c4c5567ce448f3dc56c20d5cee436e35691e4db472ed873c70fe776f367f15a62758ceb180e8b5f20cf54b3d815e6cf384f6b14e214ba3b8a43638f2b205e703890732c31dc797a80a06778fb5253f60b0c1b90b5054438a7e1a0373a782455175078ae7fb5f3a8ca02e7b3656ab915b809a7e19e0c53a93d9cca71a135bc0d659252955ce4b7a13501b9b1deb7a0f4adb49d054f1b3fe11eba67b69b3136d703b3d336c860d7ab39e10cc89c12439da7f58ffb713eb17f020c005548cefa9a72aa427167fd2f8b582950899d3a3dd140afdcb4b564288c4efe89a599c2", 0xea}, {&(0x7f0000005240)}, {&(0x7f0000005280)="8865b39699b1cc9f42a89bddba04b37b1e8c93bde96818242bb561f66be955391fb3eb2023235149b4cea5285bdb399040b942e2120b5253020746e4a793ecb11691852e30611b2956f23bb2c03d0219b75d3cc47e767bc2ad391e62aa959cfa5186349c408645050bf751b8d6109ba3bdadb5c3aedec73aa0b599b5d99be9800450d9af017d06e982ecf1c0dbe5d053dfc7331b0738a545b22db47dbeb0e5ed", 0xa0}, {&(0x7f0000005340)="3e8f140849e8c1ab571d6d4f654c622b429829c0e58045b3c3d17b12ed79f9dce4e802d3d2c72f57162cd0a228096297d8e0abc80c9ed76b8fd64af04409b71c6a89e1fd750a314fd052c6e8b2618766cdc730b17fb3d4edcdebb974ade3c15764b3f864ab3c1ea6a71a0fa628895fa2f9f1b9d5d3adc8f50a60116a6dc280a5d4c24640329a238143d7d95e7a9cc5b4cf193beb347efa136527f86f9b7d2fa260d022f670be0736c334580018c19038f1aaf11ccc00f470f4ac5a36fba2717099590ac6f18edd1971627280c4df4626ea802c28e36c126e6d052c776ae74ceb7a2fcfb3951fd798ef47bd7730afddc4a1bfe9f3f9517447533568d0e9616b2654ea5beb7e5a98fdeccc29c5c702685ee982f2a333694631e4e891998141c6dcace300a2bb37d43bbecfed0cc8f3bd3283c589390d4aec846e67a47e21defd0b61dbc75e2e7757ed24997e2c8f505c605a0654529eaac63fb563a45b449618299bce81e1903653c99a8289bec4c822a2751f1baf00dc73f5aa5bee466e88600adbdbfd8271e6f1669d00f00cdbac74ffa8e1c29c890195bef3ed1a4ac677cc500cf96ac5886ebccc541403ac2500a6bbf05e5ac88f33f677522638f9887e7527d1a276905f759cd22af960d65588352e5a02712ff2a6efd4845bb7ab9f78ca67490ed176dcb2123ac9493ebcb8242a2ffe868222b59d66bb3f82336f8ec2340cf502db124aec8d260791388188479e2fa4ca661d99b778fba7826823174e36049f6fc8f7af2bbbff08f48434572ff6898a8aaa3b4370d18a155ab96e1018cd6d3301cc73bcf93cad605437f75ee91118139a810d115b2bd4abd57e6cdab2af9bef6f0e9d3b5f561e5d22b209a8a7c15bc2c58e6662d6ea169a16947737bda5078b78f2ee772f3389227afd1750d11f39eb87a40a204952803de7f1341592c9de8889de38a7ba506510b9d6ccac4dde99183daaea785d5c89b70d89b18fe6570a6fe9c30505aed99e9261cc6182e7206f188a784a3d286aa6323b63cd99d52d0af1a143a4c9152833ac5eba3248652c998185f905f4d7c57762c1b8da3ae7c68aff207df3e1bdd329ef98834c311efa26b6e61fa7133e5d82d262c83424fab73888ae9157ac76d0ea5e19022d025d752184cb98ab64c1992904346bee1ca31a71b95a3e405a1a09c1d1d2d2ea1deedd6e2c1df4c5c5304190e3c8252159c90f65036e86ff68aa5918a1d49a466e4210991ee212420781913a06eebc334b6e836e3ec2674a9e3711a9e688225d6af5f028cd15b1ff3963b3a2f0c7f91ff54ddd8014b3e5d2817837771abc14808472f323e4dddc7ce36dfa05c8b4151b63c5777a68991f3b21cb26f60c41cc4d79b289cd2a8b99c3e178a484f980a83be9e3f2fc4a160dea312f8e07a622483f790dd5d6ecb43ecca55fd31c21c7a980aa14b63992ec4a8274b1a31a8b666ddddbe0a2b7e95ae80c27d734254f28910bcba645cbc92d767e1caf10877b33381dbc5a28123afadd84fe9c4b554616c5a2a5cdc5be305541745d76fc627243f1231246d319f83c7df4ddc0d64843044260ac52fad271072f3fb2525749211b49ae68f8f9b430698c1fb7e0a6009b09f8b294a546af09e6dac16dc280992f8a23146241f80ef8e9fdaaba6fc126049ff633763862232999886ef9751114f728be58080666f01b96c0f72ead4de24c9928ee33340ee392f37a18dc398c57287bbebec224203940f7ff82110be2c10ca1b9040b1fb915451c7910f21501c6fef798f80c081ddd83ee202d3484afccef97565dd142eb5d60caece587f6c4e4d6f89355ce88aece763dd6c2dfd03b5b271417fdc432eb12a1ac5fedba0076c7871c8a14f3eb155e564178b4a6875543c3df00d2f3ea6419b37d9fa79926d0f7b400480d08d2664644295b364b23ed5e242a1d2c0ad9d1d239752f5eb2b1e9c6e0c751737fa779b0b890af437d0fd52aace94f6da820308263c1c0399688cb041a9e37fb1009c7ca7ba1923e8307eb85cd9a793fb87db3b169372957c5c33092f9d68a142153a68f401e5f4d9f3a06f4dc1c491822186c695ea19528a187c5eeb7e6df973044cd2cc5a53681996d749246e5af092d46925ffba7419eb923b5c9492ffe24f9fb47872af71cb374a6b7f28df8168d45e989329169c1a2a66bfbca880318dbd0c566d03b3d47cf5381fc8d98eb13f61a450317689578f78e05c7479cf36291b04e00159d3b6f40655f846f482f5773f7e5e76074632ca9e3358ffc650b1e7adfc8c051cef14945066d42f2be5d80f222be0bf9328eaccfe8ef3d79c49208f90dad91ba2c22815636e6d739ee72d21c19c47342de2f0fccf28e97515de5070cc7d0326b7d4045bed6e1dd111bdf40ddc8d5c8f720bd16f0b57f6a5dc8bfbe8b868b96abeee62b07189b0c74973c3737671b251797705d12a0f784271025cab2111ccc9cd2ebc04c09488760f8b099743c76f4d7129f67a4441a06a31c69f9114a25548b48f952fc0d7a4ab9693f62745c5c1e7020b365152985baae1a4c511f94abdaa4c85160ef4ff34d4763b0f14b10dea8f8c4b5552309dfd9240856aad51b3b7f430e6817890371c6d4e856f86db06a634532174c625567258366e027647c15c36b4f9591602e93017e94bc69f0bdca26211bbad6d13bcb5118ea52b34e7bd08c823608518ba0234a658edb8fcc2bf8bf33678c103c57acae5e557886c5082f23c98356e3b65448d15b305eb7faf62ceae5e81de8dfe5a6d8921163ec49b02f1b0c217bf46213a2de8e88e6ebc965585ed0201d44ddb80161ed3be8afb6dee0ccdea746b3db2175213011609372d2419e2f5e922457d4d44da1fe2faca97e04416f78a5ddeaab2f9fd43e95a9b18ffed7bdc3725117c03e0d4490f35484c702ec5f8f800005502f7a96cb64657337011438465d7a027715e1052e4348218fde0a6d9dfa37ef907d711f0ab75fd71bae9a7aeb5006d1acb83a1003e77af268f7f18e3c4ecac1080d59b37c7d6e6d4e054754d4103837cb295d8981ad983ab5239b615e638929523858ea04fd49ce947fe8f518af00e091676ae759f06d401a2b0e5c6ed6cc769bdc1cf68eacec7eabf08f982db000c7ebe34537674fd896c2b77db8d63262ef4d289997f092560e07bb284d9bcd4bdc51511ca32090dff877f7138bf2a2747bc48f3b505f0e05c97b5122aa0db713a66ab9c67e15186c5b4304ad1c70a451fb38b2e668813f0d747e47fc612c8e95936a158d6793fd21303c26a9c5a3ee7969b2ccb3a480c72abb9fed1a83d0ec92a0fcd4578abc95167690039de72407aa834bfe75d9b5c7b7859883b51d0d059e7b0997208e8903c9aafc703ae3743d4c144bf772a450665bd64e87681241a263f347c2bc7400cd9c031928aa0fa63500882b1971c13a73f8a8185d1c5f17b38792092c5c6141aed2640913c2f65d30390352583c533d515d1dab7e714073ba3822ddc16083d6b61168936f5bdf2ebf102e5aed61d9f3d13f9561e8d89973ad039eba9f4083e9a3e1d2df933e5e56ed59ebff9bb7aa7fb05d0bf1362a7a1702dfcc2772ee90c9e6d40df99e1ba601f16d67ee3c14f6dccc1262872eea9639588337a11044f7cb6d88bda39a531ddc21f0a93549a3154e7fc687889af6cae3e8cc316b13baee8d2f7d089b6ccbc1ca83c8b4161d0568ea5008e8b82e33fc7a495e7f5798a0740961703689d9f32ec3ebef49aba96c5f2432b559a8d32efd55c5550d52583b0297a4ea23d83ae7f79342a8b423c15987d86541d3042e61f06d2038779d0c1f9f048295888623cbb9594ea318107a4b6619a185ee13a48ead476301e6bb8d683f3bb743c6159c0dae8e3e7b41303775dc0145235f6ddac42fef66f7dc58b876e3868b0bf5b9fc4937fcfdd756d61389458032727551c789560d56ceea536a82109aecf07836ff939951e4787ba844687d3db56480fd8936485601b8584a33737b46b562d51a05e7c1c89b48d15f3aa8348a227c8f79cce8efeb28fd41fb52ecc3a62d783d7f9b26e96c576390c1a66319fd92f9f85abe16d979dd29326ddc9c1a8156ab4bed654ba3a0cc4496313e0021b416d6ef7d853b20bc587e5a5f3811005c4662f17f5299d2ecce2e07da05fdbbcac25f8911f3beb7e425e3a4897a4b161deedcd1d7a21585f817a3837612e6d467bc072e0c3c41d8bff8caadaf3109d56ae24c825e4d8702eb94774ddd2d31b8a5968d924d7daf4e50f232c204ecab75aa9d483c8718ea6a65efee22f6c97ab1567f342353d55b60eb8490e0833375caf453977c8914bee6864659204290bdbf61f8099bf6a84007538906563d09c73f334e1df8ef5968640867301346ac0d674c854bc3bdf29f5a6ecc3a0370a0be91d86bf45b23b72a3edc4414fcddb2fc6b7403386974a9163dec4c248b03b0372c00d1a0f297756417cae645186e81d379e694b9337ad7fc84fc2403e5a77635cc8f3cd47a89d1a31841ad02b4a3034e5f7f22cdeb8c761c7cbab800991b94f48aea48cbfbf5dcb5883aacdaf9c28ee3366725d794000a9e8fce5696fb1b1687ef36d8f29107ff6a04c4ae4175561b902d071f3bf4568c4bdcc740a1caa61830c95c8fba66cd34754290f8a755845d7483dbec714d6be808578a9d668b2f15687f33ec07bb461f8fb4af8e9ca05bcf9a8e6b7941aa2017c20549882c15aeabcff877a5be1e380356cf45cfca368db2e5c98457ae8bd3b38957cbff4388ccbc8f94f3577b05c0072a9b5745231016fae53ec44ae14623ac0e3895ab2f686660c29757647c6f690743672165c7ccd06c2d75e265519e7bcebebb19833f904ce1fd192f4969d3396199c52044f563204fabc0ee0bcc4e4671c08e403eeffd0690c7f48cf7604c87b26089d41e49c1407faef21de44025ba0cb52e6664df47d55fa8648c1371c4fa4bae3f5b12ecc8391b383b060dc76f16431f275d4209a1ad681cec736a11bb47ef5e37abf6487bd0a3d3fa8bbc19cb598bec5968749d30d0cf749172b7be48ef806e006e2e20dd9e16ead03b3b1a14f788f74eac793b4cd164a40470b7fca0f8a71aad9ac1d50a43df63758f04370c9ce752a7c27892cf2339289066cd9435a3bd1eee47b9223951476ee614277bceda1b681520e726a7448cc5da925bc76b5ae293957feecb71f8241f248f61007217aa0f96f028bb04d698ac61c4005d41f7e333c6224996853c5a494a9f7a0d27c6d8bc07925a476603dee1842ce367f00671b09dd3553bccaf02fb3bf8c461d5f69df04cd5f8aa4c7177acaec3bdd6d89a1f248014ac7d4dc9a9d88ff84647eb9cf6d0aa635ff8943e6fe7c878db875140b95b61d45ff6ada4fbc79b0f41569e31636b19efab8f6410c52ebe4256b80fa80e142706426d5fbfb305dbb6494cbf538e103c57052a3bf3260620a82ecc2213618cbcfdeeee92686292ac24acac522d4384e2ee3b8c7b2273a9c0044a6b0541112ae3a069cd162d97bd037cd71aff1eac14a98bae45514fbac6a2d21be2c2ed6ad017a3bc888176de1a3153d406e7831ce8dd1dac047a1dc71d97ca4e8038766d795566bb5e49b7bc6131b8728b31f5813bfec666d26342cbee3ca11a7fcd2ef074144db56b5e60e91da5cf0d298a9d14a9454802bda12c729953a07434cadd390411b29dc57ab99fed8e13155c51a658da3e03533cc92fc7c307d8611a804d35bbf0ef59c219e4ea2fd6d34429cec201489c9fc35cfc3d6cf05493708edd5192ed4037386cd0e3beb74ba2837b721b5e3c7b", 0x1000}, {&(0x7f0000006340)="43bf681792ef280e460b01ce6b4f44cd63572c610d2e6f9ee3653389eafe07909cfa844f06163567f4418b7a2fd837b75c1ff56d347d1e16c5902d6b92573d9a9de6a1282fba3b200a7f8cad82d7ac8be468398a02ddec30da4ae5b97d91df085ae61ae38be94f74fe8f9dca829ff3b64759813dad9c015a1d20c9153ccdf88b8282df4cc7fe4ca72fee", 0x8a}, {&(0x7f0000006400)="b8e8a023aab0b102631de95ae8960694fc745dafeb25c3b0019679846d30a929331473b5c64c9629b4a0e74b74ecd0f5396da29b126500b18e71575434d91ffd879ad8792378116282e588e0580a3d4d4a37bfc5f8c56e5bb93a352f3f739e1bf1da900cfe39a7e819f445857a41dec339e185de47906d7a09785b169140de512708", 0x82}], 0x7, &(0x7f0000006540)=[{0xc0, 0x100, 0x4, "31ca48d80cd33ef4dae8b5c1de9dc1945d49f4b43598c21f5f486dd39958ada569da689bc7224db3b08a362dbed4a55471d4c59d5951eb7ddf7906fa73998fc9048802e77f0a6e5a3230aa0e433cd7a1b66c7f7170bc79c6073796a1a1421380b9be2b6fd8ba024242f807069c2f4aacb5a59b0fb81940e2c99f194cc6dc02bdfb31fe3aefdd7052841e46dfd6c4b9aea95184f5d38e05571784077dfca0550dc7d6388e917de4e3607735d9"}, {0x68, 0x116, 0x9, "7396b9231aa24cd570d8e56459fd1b4412b5b37d02b2b7d1cd1e8a03b69620af166a3d69e3c5d244e9b8e71dae7cbc7e988c475d4dbf22bf7f539060fe5c3f7d351f809065ca026f6c7ee2a464d2621bb09fcf71f3b661"}, {0xd8, 0x10e, 0x40, "1f128384dfe55d3421a6f1f2a18816b3cfd64a242b45eddda247387f86d999563306a9491d1020e0565f085cc1687e6c07884d057567fb184955653eac6c7b88a2ce8e7377c5c1a0befc1c6bf50b7fdd3c9f8ae32dbc4359f075888ece2837bf600ecd97ca9add04f23f39f559426f9d04bf23cb528a8595a7bce2a229687330704e2029bc7d363f8859dedcee71914067f9060c9a6bd7acba8c7fe812ba917f62d252f927ce2a0e303c1a3a39a43a9505cb4a906045f290cd047da8cbf61418d0675c9b4ed7611a"}, {0xf8, 0x10c, 0x0, "673203ee12ecfc9164430914c141e74498340f90748dfe039a6ea47ee6adf2e7baffdc8e6a067c7dddf5db2c1222b5fad40f6b1e4616d34a525a82645fce025442c3f77e014f0fb1b2f02b48702fa7155cc5660a0926bf28258010f353a2cf8f1d3b8afc6248e989b3f5f4b87957a21b338ae02299c6612162397da046633e63ad2b350c220a957231b42d146ac74a0f39e290d3261ec18c3daadc82d9c2f68ecda13c1f0cb2c990998ae0d721e9a4fe33bd5b1c8f0e978f3ced10839aa3db7f925c005e34a2bffaca9b55b578c9d6099b48201a2495d8296539eb54fc8987696e82"}, {0x30, 0xff, 0x3, "6edaae519127931d40248e08f45b191e7b335faf3e2154fc81b29ff4"}, {0x1010, 0x104, 0x4, "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"}], 0x1338}}, {{0x0, 0x0, &(0x7f0000007d00)=[{&(0x7f0000007880)="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", 0xfb}, {&(0x7f0000007980)="9cd5ffed14c5287f3883e445541855a5f06aa89a9ce3433477a8277a465e4736e05ef4bcf38bb3e218a7b3811c4597e0789c7f5e06cfca2ff955119dfdf97a1b217ac6a6b48af3973a1046e6abf9b0bfbf033e94d4b89163c6b5acea05002a3cc306c7e997175707cc7e35c6252c18a3f1a4df8efc60bb6a59815bce9c2b8510ad703576e79c64e313d21f7a6f891c0997563b35ce2027fa49de35f03b9ed2fc", 0xa0}, {&(0x7f0000007a40)="7b94cd0946570c4a6c6dbb26887cc55f27e06f97c40b4a1b56b536d0b2e4fe06c2cdfb98c2d4d4818b69d49d1fee50ef45d5d01d6924a6519b52ea1aa7cc679f0e24c48b52ffc24c07cbd7759e", 0x4d}, {&(0x7f0000007ac0)="916eff0944089b2bc9f56342d049f92e0eb6628177ad83e65c220ca69b2491b3a81047a17af3e6c10b549ad33f847f8e38b34ccadc4104fd2002fc41746b5ac1a20017186eb823823419ed7152600c02f184d89e74f28c72c71ece4bdec85118ee419ea9fc8e1f74fd679fce46ba37e33b3f852bb42fa99973d29bf9be031c8d4587dc91a81c9a5ac1e7a22f4ec2794b9c651b3a6edea0bbe9722c34816bc1fbfde501f996", 0xa5}, {&(0x7f0000007b80)="61453309b6fdf242311a3125efbee6b65e9ccfce4384b3958e4ba1b0d5569c600892a2fb394ee5f84c24dc76a743751babb6eb7bb177d08682689719a0ec32b785909a1705568ad8f3ef9761b364a14468db5ada83eabe5734086d9870c69bf7162108390d532cc874b7f602bb615edf603fe390aa210f44c82eddee8dd2134d9bac12ed707d9db94e3f7883e0cd24d979e381404e7920f2c5ff0adf0b924f38e5493020003e8659fb16b31ade0ef6", 0xaf}, {&(0x7f0000007c40)="6e605f89152d4cad616bcb4dc1741796426ee8b4c73e2db4691ee2807364c916bd45beb063d17f1e82b9a35d5724e0d21ad1d91df7d880d13bbea94fd01c77067e83a7eb41d7516c", 0x48}, {&(0x7f0000007cc0)="c3ef3eb9e3ed4855fb3267af88d99934a656fc5a5bf5f3c8b93c8617e9ac95eca46ad1bc5ec70c914a4c9c2ca5a2a97d538b63", 0x33}], 0x7, &(0x7f0000007d80)=[{0xb0, 0x1, 0xff, "43b7d63cfb2821ad476d1ecc7b2d720bad260eada4ae5b92bfa7141791ab9199927f06ad579b3b3839eb0212b4f07d110764d14791b6d2b353a8e44fba0d057db495970f9575a828d212c4c69fc361549eb76f4931dcc16de28f1f5de1a7871ec02c63fd280cb6182e178a8a5cdecddf5604bcbecf0759e317c8fa1ff822793abf848f8b3faa58b823e3af2fd8194e331e97233cde927967704f7555e411c9"}, {0xe0, 0x108, 0x1ff, "e85ffba85a7726dd148e3d33de9ad897eaaa76cdd204356578d1e4b4ed335c290aa43dbf36b65d872ecb10a61420a84e32d628541b5464fa293cae009c77c69c1461c4963edea35757860faed8912409364ac617ae4c4a2864f9076629cad911e74e2571e488b6e40abd67e91caa2d6f18628b43226df25a1863a2a09ec3dad93a06509148f82f4fd4f1db4ed1c6858db3e70a8dde1a9a06cd81e09ccbff77855bf6fe8220286b8012c00d452eaa3aa9de678bf518d92f52864e88679a61d22680104549cb879c873d8113"}, {0xd8, 0x101, 0x3, "f5780df6cb23332258cfbffdda5981589bff671f3560b99c8052c09dbcab2c9ccecaa911ac5b3032b6b0c7f836b136a3bb613aa43876e931059c8eabf3f14ae040c057fd14ccc38ddab08cb2c8b96d5dfd4da4c5d75bf9e13ae0bd95d6f1fe344e4d9ff51680d8e542d4126c14579bb9e56a213fe8ec12d11c964856b7be1bba1eb1be2931a30786586260c7e09996332553c9ab0be5493d7b36095c1a1215af9d6ca32d60b99951cb3306084c09e1407cc8e74de11dde27b5ac876e27abba630457f65b"}, {0x50, 0x3a, 0x9, "96f0644e454bba5f0e0fc0ac57cc2b1f9dc6d8ffa77c3ae1ba8d9bc906240bd997a23fe8dcf635aa1b274175e9b82ca2dfdc4b8d4aded9bc4c04f9"}, {0x1010, 0x0, 0x7f, "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"}, {0x60, 0x119, 0x1, "d75e8bd34adb0bc00b20ea81db2ac29a41d4fb656e95faff1978d4c21158de54c11e1268fdad0065b9ecfe79ac3c999f8849de62a85a74ca24274bb1a83529a1788672b4450ea2a8e894442a"}, {0x100, 0x1, 0x1, "b9b7e68348ba74b76ab265e93489c9848c320755af04fec692da8211da2fd06093bc89d44bbfb3b5b583c95435078c8063c9652326f6f656d1bc5d536459dbb0efff3cdafdfa5d4f561aff80d10c4348e8f9c6699abce59f3db23de8baf241714852c694b9745b5d8be4791c3378010b5b49764aba6478c4c6c2dee4240bad7deb1b2537ee49b7c530a47e12494896926e6a1e62575ac3c79d1152a371803b8707663b956f1c38f96752debdb6d742753921ed8d1b822342bd1e62e9d6fe2c88e4b6154e068e3de8feaace7414a788b6c3400df575ce72e5cab7c60ac91ac88df2305d03e1df45a62de425925e"}, {0x38, 0xff, 0x8, "2518eaf30cb38f6ceb37383f06f835d9fe773a6df8e4d194818ee5bc94598650b7a5d4"}, {0x70, 0x100, 0x2, "2c9372764d2217b2480b93eb03041952c6ea62b00c1a5cc9091eb49a627a429f7d2bf1106d0220ed4070483f37a39d9b87b7b11503c2d3e97dffe0e41815411f1ed67cb4aa6b61b6f8a0103941bcf0614c63d804dd36b374a0c3"}], 0x14d0}}, {{&(0x7f0000009280)=@ipx={0x4, 0x8, 0xfffffffa, "71f48a87fbfa", 0x81}, 0x80, &(0x7f0000009440)=[{&(0x7f0000009300)="55e8591f1d8e285ea6cf0dbb72c7f0fca0933bdef58f1aee3408be8bd0537efd2e839a30137e8d9c376fb3c6a23e597cc82603870662562890bf51dffc9aeb261d6a5f26885925f0f49d0ec96c3e6061e1ecde59c4a76e18018c5383ed8e09e6e4af82e48fd7b15bf99171f0497ee0fd6a77ac42592a87d4609b98b90e685d52668e81a85d91566bdf2f0b66f3637ab99446b79771bdd4d9d00c15d56bf614f16507b6272c64036e1f8c5185a1cf7e4f2d56434a0f87ca79f53ddfdfa54ec35e5e02f61d26e555fc6f1bc7", 0xcb}, {&(0x7f0000009400)}], 0x2, &(0x7f0000009480)=[{0x1010, 0x105, 0x0, "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"}], 0x1010}}, {{&(0x7f000000a4c0)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @multicast2}, 0x1, 0x0, 0x4, 0x4}}, 0x80, &(0x7f000000a6c0)=[{&(0x7f000000a540)="cb3b9462a00cd3d6b0f86aa41fa92151a39e3b2d1dfe589718e77f00741e1f76a8d35fcd590d0f7edeae9c4d32d19fd5156cc02d08d8432db5a36e6a748ef6586ee677f3e2021524d5626931760ba0b2a5d758d2dd792f8f96ca5d", 0x5b}, {&(0x7f000000a5c0)="5d31e75a460d07b9cc2c8455eed4ee32663f5d9f13467df28d33e4067abcf8f8a724b488884f3000c601042200f01a7c1a183b642127e6a72130394f21afce47ada385ff8124dfe872b6a0", 0x4b}, {&(0x7f000000a640)="d5c445e9414dbcb2a4cc22d2ada88d2296e3db96220cb8eddaae5623ac7981378eceffa3accaee1ecdfd717f8702d34bc67f536cd2b1a318289f530daa002bc978765d389a9885385f5e", 0x4a}], 0x3, &(0x7f000000a700)=[{0xe0, 0x84, 0x40000000, "8875bf06760cb28730edac578838b10e4c77d2fc68448a2a849490a2179b20bd9524053e12279f49d53e683ed32d5dd8c4c506ba5f4f5f43eb2717eb978979b0acb2b2e6c0e3d10a6d3c625d286369fcafae2b62cf556477619956b46fc39bf59f4ffb7fd87f1a8eed3db968c97a80a47a756bd8b6151b0f70c1077c805f3edfa26aeeb285e60105cf3513d97e0c23b1c4ecdd6e72d3b3616e48c3709afa44d769a4ee976224bbd61e7581cafc9d6086eb1f3ca18f53ef343b7d8d5169d0b0b3fdb45d7d565783314bf817cdaedd"}, {0x48, 0x113, 0x10000, "c0244c1c72288a640ee547e312937e4300c8696946cbf376367bdbfea0ced446d2eb0bfff98271c206bc99402dbd4144297350ae2f"}, {0xd0, 0x88, 0x6, "8cd799ba2f0ab7a3fafed2711df3bb824d4e8e0fcc60821b22fcecc9eb0e54114fff79e5e50e288ac418ce1423a3db06a494a8503f4645a1d6f90e4c7be82dd5a9d1c4fe343740ada719cf817876b61b00d484d26d1b320e86cefbf3f79e9137c09d87c2d789ff832911b80b87b5f125dc82358459a26c9446d8582714dd5973b6ac07bc8122488627550fe57e73660645a1964e132ad46d3401013fad81edbe79bc8ed1b56a8c0b400d108fc2b92e91da91d3cf5b5ee497042e1a"}, {0x1010, 0x107, 0x80, "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"}, {0xc0, 0x115, 0xa4, "374ee7c6f31175ae9e9f322111edb8e85031bb9940f449f61bb1a3a9f700e06c0f479efa7a06ff1e429def6b45bcc31ea0ed55ea6fafe8bb917fbefdce35dc956c685770a6005920963b63ae2cd2a299a0a60fb14d86f25c260091b38d5ecec91526f8d0a4b890fd23204792b7a1c5a16fa23b401eecaafe409942566be6f78b08199636b624f54439b2b4c974193436f1e1c15711230a13b11bcb4ab012d3ea28cca3feff125bc1db985c"}, {0x1010, 0x1, 0x8, "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"}, {0x1010, 0x113, 0x0, "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"}], 0x32e8}}], 0x6, 0x4008000) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:44:59 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:44:59 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:00 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:00 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x3}, 0x0, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:00 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:00 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x48) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:00 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:00 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) socket$nl_audit(0x10, 0x3, 0x9) 04:45:00 executing program 0: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:00 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:00 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000240)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nvme-fabrics\x00', 0x44003, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x4040ae72, &(0x7f0000000340)={0x5, 0x6, 0x7ff9, 0x3, 0x200}) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:00 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:01 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:01 executing program 0: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:01 executing program 0: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000040)={r0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000001c0)=@assoc_value={r0, 0x1}, &(0x7f0000000240)=0x8) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r2, 0x4004556e, &(0x7f0000000000)) mmap(&(0x7f0000005000/0x2000)=nil, 0x2000, 0xc, 0x80010, r2, 0x595b2000) 04:45:01 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f00000001c0)=0x200) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) setuid(0x0) syz_mount_image$msdos(&(0x7f0000000240)='msdos\x00', &(0x7f0000000380)='./file0/file0/file0\x00', 0x644, 0x9, &(0x7f0000002900)=[{&(0x7f00000004c0)="9f03b3abfb63ca36a6dfebf88e328ea05c67e71020c9ffcd88542979c057d88bca666fba42cfda8d035ac5619f80fccfa980cb80df1353d73a68eeaa172dbf4691723cc8545492b0cc356ad2738b5393ff580f18bd782775f202e2a7318948fca29cd93bfa015984719b333d3e8bd7e843cb68e1d2736af7d6ef29c9cfb6b3fb149d2db9", 0x84, 0x9}, {&(0x7f0000000580)="2b363a62e51e91ff88f5b6c95246cf0e4d8e5afa3c83f9f6c7793e7e2357bab6db9632458db73d827de8f1c92c0c363ea538407fec50ab81f1462a7c74c86c322dc4529018bef6270380e7ca6d609b06ead0f6bc081defd837f6fb04fbc54a87f7f453b5f26317ad241265717606004cecea3b17263045a774186cf991a47a6e575fa715c097745bb1c27cefdb65ef2b", 0x90, 0x8}, {&(0x7f0000000640)="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", 0x1000, 0x92b3}, {&(0x7f0000001640)="7fc5c8d87cf8d371286d32baed8448601fa26f4a2202da3f87cb927a2891f48676239d3b7497bacf523ea20bd8c9f881da40bec726b893a013a4ac1354726e1bc0ea49c0075ef7e74c5ba83036f20ffd47d0d04ccff495fddb1eac87c304b3f1819f", 0x62}, {&(0x7f00000016c0), 0x0, 0x7}, {&(0x7f0000001700)="4d8f6ff91834722fd8d293acb48ee97ec10d979e7f02361e0e6ba96a2b738dd4045d6551221b3ec010adb1bb0399b61983ad21f69568c87a624a16acc645d92aea6079a09ad440effacb5bd1de13e5cbe2a5986d45f80be3663e533f99a7c17dcdd11cfcf0b45f9505e0daf6cea2a9a33f496eca158606712b2886079aa5dfe2d7afbf52e2a4ff12f5fd8ab94b508acae626a8ee1f848c87d7ec9462de32855ae39e6be1ca8bac3bdc780f619aeb6dc5a5c66073d187596854a249b5e0b3389fe5f674135843d983", 0xc8, 0x2}, {&(0x7f0000001800)="021e146ceec58f68ab38506dae6ddb9157fef09dc20431d260581966b957741f599c04f6e89af4e039643b93c230cb987e20c8cd1b164612f521f3e0f187ac05e9aedf3807aae1fc653f", 0x4a, 0x1fffc000000000}, {&(0x7f0000001880)="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", 0x1000, 0x80000001}, {&(0x7f0000002880)="0e9daafdf1ae41cd73670b8527b66d68c1a48723ab3bbe553580a2643e0cc76d439eca4a1e05bd8dbcfb05d33f08361d8b4e581e89db6b65399dd670dc440993a3e0a6f979adbf2c1b32eb6260f6308f4a0d1f9d3271b47210cf508f4357628aabb1025293951c58998fa4af2e", 0x6d}], 0x1008000, &(0x7f0000002a00)={[{@fat=@flush='flush'}], [{@context={'context', 0x3d, 'root'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_user={'subj_user', 0x3d, ' \x01\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x35, 0x33, 0x30, 0x33, 0x33, 0x62, 0x35], 0x2d, [0x31, 0x30, 0x35, 0x62], 0x2d, [0x31, 0x31, 0x31, 0x30], 0x2d, [0x64, 0x36, 0x61, 0x64], 0x2d, [0x64, 0x30, 0x30, 0x35, 0x35, 0x64, 0x32, 0x6c]}}}, {@obj_type={'obj_type', 0x3d, ' \x01\x00'}}, {@euid_eq={'euid'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) setsockopt$inet6_IPV6_RTHDR(r1, 0x29, 0x39, &(0x7f0000000400)={0x3c, 0x10, 0x1, 0x2, 0x0, [@private0, @mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @rand_addr=' \x01\x00', @empty, @mcast2, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, @loopback]}, 0x88) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:01 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:01 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) 04:45:01 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:01 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:01 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000400)={'#! ', './file1', [{0x20, '/dev/uinput\x00'}, {}], 0xa, "53f57c7095972929389d756bf3561a23b2b3c980d3f4c054b2f5d728bc83172c808d6676eafff5adcade9878f7420dc631ba26f4b0d5c0429aece9d48d4748c393aba4d03a03f29581ca7755da1dc9dd5c395529eb026a2c10259e217cfae2c1fa93fe3ce0529d901f8d033ba53b13c0f50db4e03b46ad40df52f5de9c064e63d74b5bd58cd4a37e988fa7b3f2f4d4ee1b4f6393ae39bfaacf58bec573ab5536adf2bbba2e63af339140c4e512a293d9f7d2100083738ead54bd0bf3d2f518c6f11292747cb1aa3432a771c925297296b4bedd217ac1afd614082ead860bd242bc662183"}, 0xfd) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r2, 0x4004556e, &(0x7f0000000000)) r3 = dup2(r0, r2) ioctl$SNDRV_PCM_IOCTL_PAUSE(r3, 0x40044145, &(0x7f00000001c0)=0x2) sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x34, 0x2, 0x3, 0x101, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CFG_CMD={0x8, 0x1, {0x2, 0x0, 0x2}}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x8}, @NFQA_CFG_FLAGS={0x8}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x10}]}, 0x34}, 0x1, 0x0, 0x0, 0x801}, 0x20044010) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:01 executing program 0: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:01 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:02 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:02 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:02 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:02 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:02 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:02 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:02 executing program 0: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6, 0x3, 0x0, 0x0, 0x80000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'L+', 0x3}, 0x16, 0x2) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000340)={0xa00000, 0x5, 0xfffffffb, 0xffffffffffffffff, 0x0, &(0x7f0000000240)={0x9a091d, 0x7fffffff, [], @p_u16=&(0x7f00000001c0)=0x2}}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000480)={0x6a, 0x1, 0x1f, "ba3917b3e91e00fb82bf8d8402dcd6aa8d3692c7314cb2a676604aeeb68d5ae79423bc2a77494e3911028a5c05796279fd01c1beb086b360f86696333ab7a2a32c9ef4a42b54138c71c0f8a023523fa3565d157a8932b1f013f813b3527dc2e969f3031e63ed832b3dab"}) ioctl$SNDRV_PCM_IOCTL_XRUN(r1, 0x4148, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r2 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r2, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:02 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) 04:45:02 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:03 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:03 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0xfffffffffffffffa, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x4) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x2400, 0x0) pidfd_getfd(r2, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='setgroups\x00') getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:03 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:03 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:03 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$nl_audit(0x10, 0x3, 0x9) open(&(0x7f0000000100)='./file1\x00', 0x3, 0x100) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:03 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:03 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) 04:45:03 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:03 executing program 0: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49533, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000000}, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:03 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:03 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) 04:45:03 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:03 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x16000, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x14) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000440)) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) utimes(&(0x7f0000000340)='./file1\x00', &(0x7f0000000400)={{0x77359400}, {r1, r2/1000+60000}}) r3 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r3, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:04 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:04 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f00000001c0)=0x1, &(0x7f0000000240)=0x4) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:04 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:04 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:04 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:04 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:04 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:04 executing program 0: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) ioctl$SIOCAX25CTLCON(r1, 0x89e8, &(0x7f0000000340)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, 0x7, 0x6, 0x1, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:04 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83a5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'veth0_to_team\x00', 0x1000}) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:04 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:05 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:05 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:05 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) prctl$PR_GET_FPEMU(0x9, &(0x7f00000001c0)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:05 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:05 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:05 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x14, 0x4, 0x1, 0x301, 0x0, 0x0, {0xa, 0x0, 0x6}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40040}, 0x4000000) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0\x00', 0x0, 0x2285000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:05 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:05 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:05 executing program 0: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x7, 0x98021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x200, 0x40ffff, 0x0, 0x9, 0x7fff, 0x0, 0x7}, 0x0, 0x10000000000000e, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$nl_audit(0x10, 0x3, 0x9) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400)='/dev/snapshot\x00', 0x600081, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x18, &(0x7f0000000040)=ANY=[@ANYRES32=r4, @ANYBLOB], &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={r4, 0x543, 0x20}, &(0x7f0000000340)=0xc) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:05 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:05 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:05 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x1}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:05 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:05 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:06 executing program 1: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snd/seq\x00', 0x24000) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x8, 0xa102) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) linkat(r0, &(0x7f0000000240)='./file0/file0/file0\x00', r1, &(0x7f0000000340)='./file0/file0\x00', 0x400) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r2 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r2, &(0x7f0000000180), &(0x7f0000000200)=0xc) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000400)={0x1f, @none, 0x40}, 0xa) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:06 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:06 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:06 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:06 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:06 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:06 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:06 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:06 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:06 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)='trusted.overlay.nlink\x00', &(0x7f0000000380)={'U+', 0x4}, 0x16, 0x4) 04:45:06 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) sendmsg$sock(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000400)="e7b8c52e22d93ad57151ae3a2ba75bb43f9a8699ac977783fec58ab404e6f459d745ffd869b7f43eb61bbf40877f5f8d56bdd4e668922f199f07b14330693d76d2658909d651325a9ecfa5171bb8fa9f9635720f606d8eb58986153ac90d2e3437512442514d442ff3fd23bfd015fa142b382064fde017ea0ef541e7c40b29e8ae39318e7292484b3db9a462b42d96df5dabe9db3c58a3e8099cf57eaba22a9c0200b6d0cc560c56dcfd6bea2b9c126be0d65a", 0xb3}], 0x1, &(0x7f00000004c0)=[@timestamping={{0x14, 0x1, 0x25, 0xe293}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @mark={{0x14}}], 0xc0}, 0x20008040) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) syz_open_dev$hidraw(&(0x7f00000001c0)='/dev/hidraw#\x00', 0x40, 0x41) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r1, 0x4004556e, &(0x7f0000000000)) fcntl$setstatus(r1, 0x4, 0x400) r2 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r2, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:07 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:07 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:07 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:07 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:07 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:07 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r1, 0x4008550d, &(0x7f00000001c0)) 04:45:07 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x80010, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) getpeername$packet(r0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r2, 0x0, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r2, 0x10f, 0x84, &(0x7f0000000340), &(0x7f0000000380)=0x4) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:07 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:07 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:07 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:07 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:08 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:08 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r3 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r3, &(0x7f0000000180), &(0x7f0000000200)=0xc) 04:45:08 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:08 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:08 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:08 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) [ 1470.388484][T24399] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.1'. 04:45:08 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:08 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:08 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:09 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:09 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:09 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:09 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r0) syz_mount_image$exfat(&(0x7f00000001c0)='exfat\x00', &(0x7f0000000240)='./file0/file0/file0\x00', 0x6, 0x4, &(0x7f0000000500)=[{&(0x7f0000000380)="47bd79854952ef8f12a134", 0xb, 0x9}, {&(0x7f0000000400)="a71d1e678856739cfe527da89ab1a5237b4edc8e77ff114a68ee26dd7ed73e4a998874fab79a1ee4ac5366a759c5de0f64ef1feff838d9e828f23392a1ffd9492d70d9a3d41af83c8b3f6a41504459a85c41c9b4f78dd77881fd0e54403ae466e8df5d9937adbbf63b7ca120af", 0x6d, 0x6}, {&(0x7f0000000480)="bc4d92b740da326dcedbee1d73b0d04e087fe56f9c3d09594d720bc39b41bb3f79a8", 0x22, 0x4794}, {&(0x7f00000004c0)="25c3815f982e42719c67a9c4b9e9eeffce2cbe880e5cb974687e238689e11cb9df79f841", 0x24, 0x2}], 0x940020, &(0x7f00000006c0)=ANY=[@ANYBLOB='errors=remount-ro,gid=', @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d3030303030303030303030303030fd6340613030063030303030302c7365636c6162656c2c877569643d", @ANYRESDEC=r0, @ANYBLOB=',smackfsdef=GPLeth0em0vboxnet0,dont_hash,\x00']) rmdir(&(0x7f0000000280)='./file0/file0\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) ioctl$USBDEVFS_RESET(r1, 0x5514) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r2, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:09 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:09 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:09 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:09 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x100, 0x10000000, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x18, &(0x7f0000000240)=ANY=[@ANYRES32=r2, @ANYBLOB="000000fe1e00d2"], &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000400)={r2, 0x7e, "dbad7986f1d412b84533cda9995331de188d2295b5000d9b144405e715276e775f2a8141b519c5253344d67a33fa91253a87371d306f8fe990ef286a4202d8a3719c8fcffacc998dc4b130d962f46874c8dfe9749a16252cc24d4286f9208217beabc1fe8e090d2ad3cbe6d9f6f3649313fa63b930a3a8d931730b4016a2"}, &(0x7f00000001c0)=0x86) r3 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r3, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:09 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:09 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:09 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:10 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:10 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:10 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:10 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x40c4b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:10 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:10 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:10 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:10 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:10 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:10 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:11 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:11 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:11 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') acct(&(0x7f00000001c0)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:11 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f00000001c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000340)={'filter\x00', 0x2, [{}, {}]}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x100d800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r2 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r2, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:11 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:11 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:11 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:11 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:11 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:11 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:11 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:11 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x7, 0x0, 0xa}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8014}, 0x40) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000240)={0xf000000, 0x9, 0x4, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)={0x9b0906, 0x100, [], @value=0x6}}) inotify_add_watch(r1, &(0x7f0000000340)='./file0/file0/file0\x00', 0x4) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r2 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r2, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:11 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:11 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@private1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}}}, &(0x7f0000000240)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) setresgid(0x0, 0x0, r3) lchown(&(0x7f00000001c0)='./file0/file0/file0\x00', r2, r3) 04:45:11 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:12 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:12 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(r0, 0x4, 0x60000) r1 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x7ff, 0x8c40) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x18, &(0x7f0000000340)=ANY=[@ANYRES32=r4, @ANYBLOB="1e83d3bc6f5d48900ff3a73d8987297df92a"], &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000240)={r4, 0xa5e}, 0x8) r5 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r5, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:12 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:12 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:12 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:12 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000001c0)={@loopback, 0x1326, 0x0, 0x1, 0x2, 0x1000, 0x8000}, 0x20) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000240)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x4004556e, &(0x7f0000000000)) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000440)={0x9e0000, 0x6, 0x4a, 0xffffffffffffffff, 0x0, &(0x7f0000000400)={0x9a0910, 0x80, [], @value64=0x4}}) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000480)={"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"}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x3, 0x0) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000380)=0x200) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0xff, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x80}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r2, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:12 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:12 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:12 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:12 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:13 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='illinois\x00', 0x9) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:13 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:13 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f00000001c0)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:13 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:13 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:13 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:13 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:14 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:14 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r1) mount$overlay(0x0, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)='overlay\x00', 0x40000, &(0x7f00000004c0)=ANY=[@ANYBLOB='default_permissions,xino=off,nfs_export=on,measure,dont_appraise,fscontext=user_u,obj_role=,uid<', @ANYRESDEC=r1, @ANYBLOB="0612ecbdb1ee84504fbecbf85e99576858de04cbfdb50e8445730a3e44eb7ecec8cd0baf220a111283ce00c8450859007c9f6689da5c6ddf018e263e137e765256c91e2944059969d3f210bec3374963cc2f359a68be94b0e8bd9c684d2112842df4b936ccf68a97cda575673e16cf0eacfda777a180ec40bc0cdf3b0be7d81bcfa079b10ba05a43f62f0671e97491cdba464ff59b0b55302a3f4c1465fc9a00000000006b992fe379b53d0b472d3d93a8ede77d2f617e6614504970aabf2d464eb79b820efd9040da8fdc91fd33dd962192"]) r2 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r2, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:14 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) ptrace$setopts(0x4206, r0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x40, 0x0, 0x0, 0xd6, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1a020, 0x0, 0x7}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:14 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:14 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:14 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:14 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:14 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:15 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:15 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:15 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x94) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f0000000240)='cmdline\x00', &(0x7f0000000500)='./file0\x00', 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x20, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) sendto$l2tp6(0xffffffffffffffff, &(0x7f0000000400)="3e61842e6e7b64a2eb93971321ccf0c88c25aef04621704ab834d056a500ba632b0c0dc36e598dc993e84ae580ea6aadc739a19d5d4ca777302e7b35c2d673653efc4aaab83cdd7653e432d3ce37de644ce3a5bb09e666c2d9dd3d6d58113f7b569b6d8ffd2cd2419b336fae10745edc5cd13c83629acdb92c33589a4a626f32e13f35ddbf358050d13d86d5db4c88f9901442867e5afd8783886f0a8feff90a0d4fbe2d3b205c7c0e39770aaac6503c5597b7c36b8c37649808a52bc2b5009c1759b8c9756487b9e7bf7bdfaba8813d826d1264084b8786a1a30c4b14133c65505a8226095c970118cecb77c3fd1a", 0xef, 0x80, &(0x7f00000001c0)={0xa, 0x0, 0x800, @private0, 0x8, 0x1}, 0x20) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000540)={&(0x7f00000003c0)={0x28, 0x140e, 0x200, 0x70bd26, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_RES_PDN={0x8, 0x3c, 0x3}]}, 0x28}}, 0x4) r2 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r2, &(0x7f0000000180), &(0x7f0000000200)=0xc) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000040)={0xe655, 0x1, 0x3, 0x2, 0xf8de, 0x8000}) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x8) 04:45:15 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:15 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f00000001c0)={0x1, &(0x7f0000000400)="c8943a398edf1ea99b7442c88948dda8ffeffd2cc0141bfd10ccb3accbbda4e3244107da0c19677408a158ce1a566dfcf934df208fbb502e6b6c2e8a82ad65d0ee0870fae05bf010d14ebf9e25ed680033b37515eb9b7fc040f9c27687004042c36db05f6945"}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @ipv4}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000a00)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f0000000480)={0x55c, 0x12, 0x1, 0x70bd2c, 0x25dfdbfc, {0x2c, 0x0, 0x85, 0x56, {0x4e20, 0x4e20, [0x1, 0xfff, 0xffffff00, 0x6], [0xffffffff, 0x0, 0x5, 0x5], r2, [0x3, 0x2]}, 0x0, 0x5}, [@INET_DIAG_REQ_BYTECODE={0x98, 0x1, "73ae07df9282841638a11569b283129035ea3d407d0b2d8eeb349056baeb36e2329a4836a8dda4f5a435331e6278986c0a4d7f55b9ced2daecb0a0dade32c38e47b1935c99cb2ec80652266d53851308f864db82e921375859aa5004bea72350d4e52d2719e99ce6e71fe044131e33cdd5c2c07e93a255edcf5bf4f1b776257194a1753e4ac812a5cd61c7765eff06af1020df7b"}, @INET_DIAG_REQ_BYTECODE={0xcf, 0x1, "b7a392d045f0fb83f334ca5f8be6d252774a2d1adeae8b6f6a6fbe985dfc5ead0e6e9390401fb0da01fb77384e3ccd901a6975cc4d8d2925e950fe8b504e52f0f9c688b611f9b840a64b6fb4952b20e0dd8c7536e0a5ca3ccf10bea9c86d55d2f9ddaad546154d77c86de8fab18f325b3cf8147983fbdd7f5777981e10d7effce819dc96ae7b15764a95dbd8364aad78ebfd271821f0b913c63bbd2d90206960dcd89a3e0e3d1826decf24df6acab98b377271d7f3f7f600752b427a94f4fb799e563d97b3bbb2efc9074e"}, @INET_DIAG_REQ_BYTECODE={0x8, 0x1, "2391a4bd"}, @INET_DIAG_REQ_BYTECODE={0x5, 0x1, "fd"}, @INET_DIAG_REQ_BYTECODE={0xf3, 0x1, "752fe6e918af5ad7322a082db167d69e88fc55f1a34a28d33ed49e865b36e6158e45722c7a652f6c4ef70dfcbb54a5d5adbb02bb2e3b4e89bb606a2bf970d92e27cac04c0054941ef19a0937169a9b77d086b9f301f6abacb188088d4670a9e3f6958729bbf68c64535d3508c74368f74914836da7e3dc86ed848d83b180871815120e60592e630ce1e449cb82f6d1696f711ff33b21f93dc2bf142b0a1fb2f2f67aee2f1176cba0c7aa9a5e34c88f6bafc4a73fc9019618768c5d672a768b50af3a3712df082d83d4b4ede333387469c9256c8c9e56dc41623443f2c74834c3e7b26b67a6fee007adc791cc9611e2"}, @INET_DIAG_REQ_BYTECODE={0xaa, 0x1, "f03047137cf4f3a9b5d6be0fc787efa05179c789a6f3fab025eb7b670d9bf137980413a60504f5dd5242b4d04b8a9da236a7c19e6c9ca5d981a3399aa24d6a9155e7198d854f67a70c59637cd10cd7a15b6368735746524bd9b4ec4c5a98950ec0d327c04788d9920b8c52eef5f74d947735f674c32dd6ef0de607e2fd45984a9b72f860f65d65d47ee7fbc78f047ff19b18a6e6796a5fd629cbb432f3c099d0c49e21a53fe1"}, @INET_DIAG_REQ_BYTECODE={0xfd, 0x1, "af90cfcd3d1d707511fbe2bb258827be44081855fac6c92b18f9ec4f2e8e1721c0be5f7f704d06cd0bb77d480702018690e0014faf18eb2c9c2243b52c161f3e0f3aba0367c4c43b14c4754e0341493c6bad48e6fd757926be9e80c97f2abfe888cb3d60f0850b1f49c6a26b95b2fdd630b74002668d36f51ac75d5b8dfd86b9764bb317166828f311cfbd8015c4b38bc443819e1862e93c3261971e78d8e1d14e5d005a5a5d367f95fa74e6ab30ea0839d6151ac0086566c8d2371f64c9291b3344b04469980552c9743a4168a9144f43e79a98bc4a73ca134a890cd522754c552abffd7908c0f06df319ba795394b7c94b32ba4025d40750"}, @INET_DIAG_REQ_BYTECODE={0xf6, 0x1, "7ef340c1ee64e390bcaf76f841140835ebb2a292c579e9cef97e9e425265087fbd466ec40ee15f19276120c030b825d82ca52d65435cf63a8a5a8f69fdcf20181395f03930b2bcfacf7568a43a879586915d0376dbfda48684503fcf9500f537c42b9abebeb29e3d24c01dd34858ead9848fc7953ff709fb977cb0f018f7e562370e42974930e961ebe3fdfa96d0f6c7ab2502e90af357ca5d36039606b4d8ab65f62be97f7e200fb0cdfff8a900cab231fa3803f08ba271b27389a42abd6a3fb28f2976669487920b5ac3835d0adf3037b7247c49497c3e0b57be528c841c7a60dae08ad13f7de8e067b8240ab00fbd179a"}]}, 0x55c}}, 0x8000) 04:45:15 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$nl_audit(0x10, 0x3, 0x9) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000080)=@ipv4_newrule={0x24, 0x20, 0x1, 0x0, 0x0, {}, [@FRA_FLOW={0x8, 0xb, 0x80000001}]}, 0x24}}, 0x0) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) syz_mount_image$erofs(&(0x7f00000001c0)='erofs\x00', &(0x7f0000000240)='./file0\x00', 0xffffffffffffff45, 0x5, &(0x7f0000000740)=[{&(0x7f0000000340)="1f3db435ab9ae684034f3505be3ada5e9e8667db261d9e47ddaa7a78eb082c51fc662df5c101e61fe50e89b0fecdd91d632a8c29bb29a467fca5c1ec64b4f09a5af401965ee2a65b53bf9c657eb344110da88cc6bf5832a8b9c716b7171ce5ed7054d6be72701a715d1c51fe77623b14a40387b4b56b78f3a81ae0", 0x7b, 0xff}, {&(0x7f0000000400)="de357d449230520a4f096ae5d39bb2fb66cb7cdfc21aa5e10c4958dd80d840b56f736a95f763996532c0747e16df86a0a7b489b8ebee1a24021d68d2f61a6ec484808b921b1b06ab695f143226bff2d1308532870c87db630c0db26a1f4a09f32373a7513a5c711a8234e6e2f7d2fda28e73fec572ae3dbde445e8b2837846713e5f8e88c83f21f90be3a1100e760e0ec741f8eb05a4741a49e145721cbca8a7b99ea357ea7986055dba4cf042973c397ff81150d273cc8044c8224f6a2f616ff935dc487c98b1c40c217fcbfdebfd684dd9310c1792e3514dd1426adf66efc7766e744b1dfff7b696e84a4a4f6457", 0xef, 0x907}, {&(0x7f0000000500)="f5082c0a85981bd668212a6ff430f0c0352ba90923006969c8bbfc702072d052545f1f30cb71355bab682e58e8f0de1d4c00da180415dd8ac0f2ee75139ba273f7b20f9cee25b0ec7b4fdcf9e777caa885f7b3c506ebfdf7ad665f0b318088b91d8d4f586f1ffd8285c0cdc1df6ae3eb7ef11af437e31ebc177ea9116e6c9a9f3a3d688b261301be90c23ccd907d45cc3ea95db477b151fd484cbf604b7c0b2bef02d6aec55d2a73cc3769660b5b2ee14771449a26fed75c801843193e9a1c767d2825482961119c4720b978ea39aa0ee5d4237c", 0xd4, 0x555}, {&(0x7f0000000600)="3284a39c9f09b121a902345e", 0xc, 0x101}, {&(0x7f0000000640)="f0464215e415b551f59877e3bec33946b07d5a19ab515e79a9bc825899ad126b5697af53457bd01ecf31e194a5b1d0869d0aba5f4c0f230ebc0c86f18497666cc7bd92308e8e5421f56ea007fb023a712feec2884ea5314f0ac6111204af0c571324a2da1c656ff8f7da1d836c3f311f905cf5c93275f2f9905e3bcf91230361ea0a6b86c9fe6583e766c1762d435c72f335ec539227ad750dabd49e5b13b8544811c7bab54748ad2ae8b4806335119f77223b35d188db67db66f7e56b40212895a0978dafa65343f0416e673b93b1908fa41a224b03d1539f8b581d505c601ff7", 0xe1, 0x6}], 0x8, &(0x7f00000007c0)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x10001}}, {@nouser_xattr='nouser_xattr'}], [{@appraise_type='appraise_type=imasig'}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x39, 0x33, 0x64, 0x33, 0x62, 0x65, 0x64], 0x2d, [0x63, 0x35, 0x63, 0x39], 0x2d, [0x31, 0x35, 0x62, 0x64], 0x2d, [0x5, 0x4d, 0x38, 0x34], 0x2d, [0x62, 0x66, 0x66, 0x62, 0x38, 0x36, 0x32, 0x65]}}}, {@audit='audit'}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 04:45:15 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:15 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:15 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:15 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:15 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:16 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:16 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:16 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000480)='./file0/file0\x00', &(0x7f00000004c0)='trusted.overlay.origin\x00', &(0x7f0000000500)='y\x00', 0x2, 0x2) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r0) syz_mount_image$hfs(&(0x7f0000000540)='hfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x2, &(0x7f0000001680)=[{&(0x7f00000005c0)="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", 0x1000, 0x3}, {&(0x7f00000015c0)="d38502ea340f8e77cfba199db76fe97127919e6fdceab7babd1ee0f2e96bbb3daabc36326b918144308aef578db1d8535be42c1a5b0103d1d1e0cd250c3a87b846626f96e97bde5104605c1eedb3a44cd412252b84a26dea171f2c878b434f118d0bf2f73fb26799d492fce97e052622f640dbce63810b6fe69fba94c4a26217d7cf401b6dc3347a17910711230fd4b4534950c9e8514c1a0298a4a2208eed1f7ff5137d", 0xa4, 0xf9}], 0x2800000, &(0x7f0000001780)={[{@type={'type', 0x3d, "45c50dfe"}}, {@file_umask={'file_umask', 0x3d, 0x800}}, {@codepage={'codepage', 0x3d, 'cp949'}}, {@type={'type', 0x3d, "e39e9fcc"}}, {@type={'type', 0x3d, "c8c83c38"}}, {@uid={'uid'}}, {@file_umask={'file_umask', 0x3d, 0x2}}, {@creator={'creator', 0x3d, "94748d4c"}}], [{@smackfshat={'smackfshat', 0x3d, '/dev/hwrng\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'trusted.overlay.origin\x00'}}, {@uid_eq={'uid', 0x3d, r0}}]}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x82, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:16 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:16 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) recvmsg$can_raw(r0, &(0x7f0000001980)={&(0x7f0000000340), 0x80, &(0x7f0000001800)=[{&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000001400)=""/129, 0x81}, {&(0x7f00000014c0)=""/88, 0x58}, {&(0x7f0000001540)=""/205, 0xcd}, {&(0x7f0000001640)=""/243, 0xf3}, {&(0x7f0000001740)=""/163, 0xa3}, {&(0x7f00000001c0)=""/34, 0x22}, {&(0x7f0000000240)=""/43, 0x2b}], 0x8, &(0x7f0000001880)=""/238, 0xee}, 0x2000) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:16 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:16 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:16 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:16 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:16 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:16 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:16 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:17 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:17 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:17 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:17 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000240)={0xaa, 0x6}) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(r0, 0x4, 0x6000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) faccessat(r1, &(0x7f00000001c0)='./file0/file1\x00', 0x38, 0x800) r2 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r2, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:17 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:17 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:17 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:17 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:17 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:17 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:18 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) connect$caif(r0, &(0x7f00000001c0)=@dgm={0x25, 0xfffff8c5, 0x3}, 0x18) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:18 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:18 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:18 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:18 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:18 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$nl_audit(0x10, 0x3, 0x9) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/psched\x00') read$eventfd(r1, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000580)={0x0, @multicast2, @empty}, &(0x7f00000005c0)=0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0x14, 0x3, 0x7fff, 0xd1, 0x20, r1, 0x3, [], r2, r3, 0x3, 0x3, 0x1}, 0x40) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:18 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:18 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:18 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:18 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x8, 0x2) 04:45:18 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:18 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:19 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:19 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x7, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f00000001c0)) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:19 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:19 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:19 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:19 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:19 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:19 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:20 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:20 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)={0xffffffffffffffff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000180)={0x1c, r3, 0x1, 0x0, 0x0, {0xc}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x1c}, 0x1, 0xa00000000000000}, 0x0) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x3c, r3, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @remote}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000851}, 0x20000010) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:20 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:20 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000340)='y\x00', 0x2, 0x3) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) socket$nl_audit(0x10, 0x3, 0x9) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f0000000180)={0x4, "1a5dabd728a0896cb058c71fef7a91cb93b1997cfc6abb9d1e4420541e12f010", 0x2, 0x1}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) getpeername$netlink(r1, &(0x7f0000000380), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:20 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:20 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:20 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:20 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:20 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:20 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:21 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r2, 0x0, 0x0) sendmsg$NFT_MSG_GETFLOWTABLE(r2, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x6c, 0x17, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_FLOWTABLE_HOOK={0x38, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1\x00'}, {0x14, 0x1, 'syz_tun\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xf8}]}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x6c}}, 0x2000c000) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:21 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:21 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:21 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x4004556e, &(0x7f0000000000)) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000340)={0x0, 0xfb, 0x7c, 0x2, 0x0, "3cb8b70ce7158377b88f4ba48b235a22", "d690a633e9974bdcd9526cdf2dc1cd840a230eccc915b475ef50a58ffdde61d5c2725a24d259e790a18949f859da3e490e3a2379ef39f11d6c7a318f4df820485084c9c3aadc7a1b5c2fe0c4a7dd89c5564b5b740491d138e83608364e24bc4e2bc876b1666fad"}, 0x7c, 0x2) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x1}, 0x4201, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r1, 0x4004556e, &(0x7f0000000000)) vmsplice(r1, &(0x7f00000005c0)=[{&(0x7f0000000400)="6a0e7930433c251ec481be11e8328832f71b739aa14497ced8823865fd178dae67f443433579ab2401b187bee8d3d4507cf1c410f6b6a90c880b2f09be5093840a248340", 0x44}, {&(0x7f0000000480)="1907bf7b75b752195bfba0690e1bdba1272f3d78a84a1b8b1d4599a93ab172a52d08881cf67c56f6ac6c656f06847e0565d298126792060d43cf463f4387a9ce01bb0c09b9ad16e5bbd376551df424703fc4d519e25f053af6a7f1b528fd9b", 0x5f}, {&(0x7f0000000240)="e58a84232615f01e6a5b72511f9741a6505da5b8042a5b500ef3162a99274335a0950c0c77bd73f564ff901351159e9adf81f39d3e884e", 0x37}, {&(0x7f0000000500)="b531cc069accdf755b6b504fc58b12488b7ec0bcd1d6a35fcd514c103fd01f85da1ba2606362460336bf561c80df71ed589b6f7abde18b73cd2a3ebb16f0fa03eb5134e31661d55d97ee72442b6c6b52204aef310f57a516a07658971b11bd8a52090e59be9e5c19912ed48cc08fc3e4ea5550fe829c4ed15e00eee1d1be295bba8c5282f382be7d25de58fdecf570575452a7f82ff20e2069d28c14de3e755a1e3f715d8a59f4c5fe5ae6", 0xab}], 0x4, 0xc) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r2 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r2, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:21 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:21 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:21 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:21 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:21 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:22 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) sendmsg$NFNL_MSG_ACCT_DEL(r0, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB="20110000030ff9080000000000000000020000070c0006400000000000000006"], 0x20}, 0x1, 0x0, 0x0, 0x64}, 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) ioctl(r0, 0x10000, &(0x7f00000004c0)="520605e38d58a23f5268483f118971007304dded1f2554c1d1b314dc00d1e26f6d1eaddcd3bca873457f443f5fd8e75f2034a28dd08e40def666397be82344ab42c8faa27e209dc551283892d70ecdcc442d7624d7b4a0cd51e6a31ac8093165205c9a1d41") mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0xa}, 0x140, 0x0, 0x0, 0x0, 0x7fff, 0x20000000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x2) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000380)=0x1) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:22 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x18, &(0x7f0000000400)=ANY=[@ANYRES32=r2, @ANYBLOB="080040007a5476aebf91c3968f930ef9a96e5d0221e507ef1218d0f57f77a7154686c6330437f0c0c4b8f4912a0c54b0e5f8"], &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={r2, 0x4, 0x9, 0x0, 0x40, 0x1}, &(0x7f0000000240)=0x14) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000340)={r3, 0x6, 0x6, 0xe5e, 0x6, 0x9}, &(0x7f0000000380)=0x14) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0x218dc27, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r4 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r4, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:22 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:22 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:22 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:22 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:22 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:22 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r2, 0x0, 0x0) sendmsg$NFT_MSG_GETFLOWTABLE(r2, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x6c, 0x17, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_FLOWTABLE_HOOK={0x38, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1\x00'}, {0x14, 0x1, 'syz_tun\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xf8}]}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x6c}}, 0x2000c000) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:22 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:22 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:22 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:22 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x110, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) setresgid(0x0, 0x0, r0) setxattr$system_posix_acl(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="02000000010000000000000002000600", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000500", @ANYRES32=r0, @ANYBLOB="1000000000000000200000000000000056fc3abe234cc36cad87ba97dace687340693cdb44ba137c5cfcde03ae3cfcd1970b323bf474d448d47e6ee3fcfaf5c13c4ec2e9d987820b63732ef937f1fc2e9a69cea89f997e75d26b35e68efd21e44a38768b7e2a958298ef3ebcb9"], 0x34, 0x3) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:23 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:23 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r2, 0x0, 0x0) sendmsg$NFT_MSG_GETFLOWTABLE(r2, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x6c, 0x17, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_FLOWTABLE_HOOK={0x38, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1\x00'}, {0x14, 0x1, 'syz_tun\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xf8}]}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x6c}}, 0x2000c000) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:23 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:23 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:23 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:23 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x11, &(0x7f0000000240)=0x3, 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x1) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f00000002c0)='./file0/file0/file0\x00', 0x0) 04:45:23 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:23 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r2, 0x0, 0x0) sendmsg$NFT_MSG_GETFLOWTABLE(r2, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x6c, 0x17, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_FLOWTABLE_HOOK={0x38, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1\x00'}, {0x14, 0x1, 'syz_tun\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xf8}]}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x6c}}, 0x2000c000) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:23 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, 0x0, &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:24 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:24 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:24 executing program 0: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000240)={0x400, 0x0}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000340)={r1, 0x3}) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='stat\x00') read$eventfd(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x40000000, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x20000002}, 0x40191, 0x7, 0x0, 0x0, 0x3e, 0x9d8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r3 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r3, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:24 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:24 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:24 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, 0x0, &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:24 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000340)='y\x00', 0x2, 0x3) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) socket$nl_audit(0x10, 0x3, 0x9) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f0000000180)={0x4, "1a5dabd728a0896cb058c71fef7a91cb93b1997cfc6abb9d1e4420541e12f010", 0x2, 0x1}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) getpeername$netlink(r1, &(0x7f0000000380), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:24 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:24 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:24 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, 0x0, &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:25 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000400)={0x20, 0xfff, 0xff, 0x800, 0x3, "98c55d45392d71c6"}) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/llc/core\x00') syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x0, 0x400000) read$eventfd(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0/file0/file0\x00', r1, &(0x7f0000000240)='./file0/file0/file0\x00') mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r2, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:25 executing program 0: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0xb}, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:25 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:25 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0x0, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:25 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x80) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000240)={0xa, {0x2, 0x2f, 0x4}}, 0xa) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r2, 0x0, 0x0) ioctl$RNDGETENTCNT(r2, 0x80045200, &(0x7f00000001c0)) 04:45:25 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) connect$caif(r0, &(0x7f00000001c0)=@dgm={0x25, 0xfffff8c5, 0x3}, 0x18) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:25 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:25 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0x0, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:25 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', 0x0, 0x0, 0x1) 04:45:25 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:26 executing program 0: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/file0/file0\x00', 0x3) accept$phonet_pipe(r0, &(0x7f0000000240), &(0x7f0000000340)=0x10) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) socket$inet6_tcp(0xa, 0x1, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:26 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:26 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:26 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:26 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0x0, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:26 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:26 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', 0x0, 0x0, 0x1) 04:45:26 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:26 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:26 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:27 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', 0x0, 0x0, 0x1) 04:45:27 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:27 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:27 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f0000000380)) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f0000000400)='./file0/file0/file0\x00', 0x1084ae6151b440de, 0xc00, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r0, &(0x7f0000000540)={0xa0, 0x19, 0x1, {0x2070, {0x80, 0x3, 0x6}, 0x100, 0x0, r1, 0x80, 0x1, 0xcd, 0x1, 0x5, 0x0, 0x2, 0xffffffffffffffff, 0x7bd3, 0x4, 0x7, 0x23, 0x0, 0xfffffffffffffeff, 0xd44}}, 0xa0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r2, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r3, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000001c0)='westwood\x00', 0x9) 04:45:27 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:27 executing program 0: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f00000001c0)=0x1, 0x4) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x20a7820, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FICLONE(r1, 0x40049409, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x800, 0x200200) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x7, &(0x7f0000000340), 0x2, 0x9}}, 0x20) fcntl$setstatus(r2, 0x4, 0x6000) r4 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r4, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:27 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:27 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:27 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:28 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:28 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:28 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x0, 0xd86}]}, 0x18, 0x1) 04:45:28 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsu\x00', 0x1, 0x0) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000240)={0x3, 0xffff, [{0x2, 0x0, 0x8000}, {0x80000000, 0x0, 0x100}, {0x98, 0x0, 0x2}]}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:28 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:28 executing program 0: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:28 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:28 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:28 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:28 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f0000000380)) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) statx(0xffffffffffffffff, &(0x7f0000000400)='./file0/file0/file0\x00', 0x1084ae6151b440de, 0xc00, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r0, &(0x7f0000000540)={0xa0, 0x19, 0x1, {0x2070, {0x80, 0x3, 0x6}, 0x100, 0x0, r1, 0x80, 0x1, 0xcd, 0x1, 0x5, 0x0, 0x2, 0xffffffffffffffff, 0x7bd3, 0x4, 0x7, 0x23, 0x0, 0xfffffffffffffeff, 0xd44}}, 0xa0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r2, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r3, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000001c0)='westwood\x00', 0x9) 04:45:28 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:29 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x0, 0xd86}]}, 0x18, 0x1) 04:45:29 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:29 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r0, 0x407, 0x3) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:29 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:29 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x0, 0xd86}]}, 0x18, 0x1) 04:45:29 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:29 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsu\x00', 0x1, 0x0) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000240)={0x3, 0xffff, [{0x2, 0x0, 0x8000}, {0x80000000, 0x0, 0x100}, {0x98, 0x0, 0x2}]}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:29 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:29 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff}]}, 0x18, 0x1) 04:45:29 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:30 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:30 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff}]}, 0x18, 0x1) 04:45:30 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) write$P9_RWALK(r0, &(0x7f00000001c0)={0x16, 0x6f, 0x2, {0x1, [{0x1, 0x3, 0x4}]}}, 0x16) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:30 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:30 executing program 0: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setresgid(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) setresgid(0x0, 0x0, r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) setresgid(0x0, 0x0, r1) lsetxattr$system_posix_acl(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="0200000001000000d393991b02000700", @ANYRES32=0x0, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="040003000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="ffcc0619cf918f256ef128c2d3c6ac224f14b4cb6f9fac7b4f340e85aa261ab00f077ee41d38add3ad5dfa93b2e30a3ae49f1ec494c40d1cce86ed6cbee204eac0fb36d37dcf5b3ea96f33b6f90ba1948b582d794a93ce7697f4996b5bd201d9ee9c07fc60049425a33217bcd89df6e546307220fd944bb59fe2ce0e1efea37aa2487b518081e0d2bbf569ea39c74dcdc469491cbeb7c2870cbb2504288c51df51dcb2a58666a0283b91df3d03f34688e9981b7a4277", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="10000600000000002000000000000000"], 0x6c, 0x3) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r2 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r2, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:30 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:30 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:30 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:30 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:30 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:30 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff}]}, 0x18, 0x1) 04:45:31 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:31 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff}]}, 0x18, 0x1) 04:45:31 executing program 0: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x103081, 0x0) 04:45:31 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x4}, 0x10010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:31 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:31 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:31 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:31 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff}]}, 0x18, 0x1) 04:45:31 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:31 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:31 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:32 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:32 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:32 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:32 executing program 0: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x7, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0xa00, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r2 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r2, &(0x7f0000000180), &(0x7f0000000200)=0xc) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000040)={r4}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000400)=ANY=[@ANYRES32=r4, @ANYBLOB="b00f81004db55437f1cf7690b45545e66c136cf913e9b2be1828ab2c9d02cb98f20bb6b6a428b024b975386d210661bab8c3b1039b5a0472d1b60d4e2e01ff74c1de0306f1b02e8ff960baca677341b7a98d7bba797d3256d1f72bf9838353d96e4d9e8d3e93ecc23d1a91cd14"], 0x89) dup2(r0, r1) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:32 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) ioctl$SIOCAX25GETINFO(r0, 0x89ed, &(0x7f0000000400)) mount$bpf(0x20000000, &(0x7f0000000240)='./file0/file0/file0\x00', 0x0, 0xa77830, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:32 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff}]}, 0x18, 0x1) 04:45:32 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:32 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:32 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:32 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:33 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r0, 0x407, 0x3) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:33 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:33 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:33 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f06572"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:33 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:33 executing program 0: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11a, 0x0, 0x0, 0x1, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:33 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x48000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:33 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f06572"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:33 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:33 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:33 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:34 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x0) 04:45:34 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r0, 0x407, 0x3) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:34 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) accept4$unix(r0, &(0x7f0000000400), &(0x7f00000001c0)=0x6e, 0x80800) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:34 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:34 executing program 0: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000003c0)=0x2, 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x120) mount$bpf(0x20000000, &(0x7f0000000240)='.\x00', 0x0, 0x14802c, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r3, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000340)={0xc6d, 0x1, 0xfffffffffffffdd4, 0x8, 0x4, {r1, r2/1000+60000}, {0x2, 0xcc767fca08ed2acf, 0x0, 0x3f, 0x7, 0x2, "eb8bc963"}, 0xffffffff, 0x1, @planes=&(0x7f0000000080)={0x7fff, 0x65, @mem_offset=0x7ff, 0x5}, 0x0, 0x0, r0}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r4, 0x40a85321, &(0x7f0000000400)={{0x3, 0x40}, 'port1\x00', 0x20, 0x30020, 0x800, 0x7fffffff, 0x7fff, 0x8000, 0x6, 0x0, 0x0, 0x3}) mount$bpf(0x20000000, &(0x7f00000002c0)='./file0/file0/file0\x00', 0x0, 0x1868088, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r5 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r5, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:34 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f06572"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:34 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:34 executing program 0: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f00000001c0), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:34 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x0) 04:45:34 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:34 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r0, 0x407, 0x3) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:34 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:35 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000380)={&(0x7f0000000980)={0x158, 0x0, 0x10, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x6c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7ff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8eb7}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1f}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_NET={0x30, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100000001}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xa3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xc3}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_MEDIA={0x58, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}]}, @TIPC_NLA_SOCK={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x800}]}, @TIPC_NLA_BEARER={0x1c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}]}]}, 0x158}, 0x1, 0x0, 0x0, 0x4000}, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x80045005, &(0x7f00000001c0)) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) r1 = socket$inet(0x2, 0x80000, 0x8) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000480)=@mangle={'mangle\x00', 0x1f, 0x6, 0x478, 0x248, 0x1b0, 0x248, 0x0, 0x2e0, 0x3e0, 0x3e0, 0x3e0, 0x3e0, 0x3e0, 0x6, &(0x7f0000000400), {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x0, 0x2, 0x5, 0x2, 0x6], 0x6, 0x3}, {0x3, [0x2, 0x1, 0x6, 0x5, 0x2, 0x1], 0x5}}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x6b3203ffcc69cd7f}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@empty, 'bridge_slave_0\x00', {0x3}}}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x3f}}}, {{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00', 0x0, {0x21, 0x40, 0x3}}}, {{@ip={@empty, @dev={0xac, 0x14, 0x14, 0x2e}, 0xffffffff, 0xffffffff, 'syzkaller0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x6, 0x2, 0x2}, 0x0, 0xd8, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x2}}, @common=@set={{0x40, 'set\x00'}, {{0x2, [0x7, 0x0, 0x0, 0x1, 0xd2e4271f76da2264, 0x4], 0x6, 0x3}}}]}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x2, 0x4, 0x4}, {0x2, 0x5}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4d8) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r2, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:35 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x0) 04:45:35 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:35 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:35 executing program 0: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0/file0\x00', 0x12) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:35 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:35 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x0) 04:45:35 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f06572"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:35 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:35 executing program 4: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:35 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x20000, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000240)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000380)=0x18) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000400)={r2, 0x1}, &(0x7f0000000440)=0x8) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x670}, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r3, &(0x7f0000000180), &(0x7f0000000200)=0xc) msgget(0x0, 0x20) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:36 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:36 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:36 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f06572"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:36 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x0) 04:45:36 executing program 0: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x2) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x81, 0x101001) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:36 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x434, 0x3f3, 0x800, 0x70bd2c, 0x25dfdbfc, {0x3, 0x1, 0xe, [0x1000, 0x8, 0x2, 0x6f6a, 0x8001, 0x1, 0x9, 0x9, 0x6, 0x7, 0x6f51, 0x20, 0x5, 0x9, 0x400, 0x3, 0x7, 0x4, 0x7ff, 0x7dfe3896, 0x6, 0x9, 0x200, 0x1fd, 0x1f, 0xfffffc00, 0x9, 0x6, 0x5, 0xffffffff, 0x9, 0x3, 0x7, 0x8, 0x3, 0x9, 0x4, 0x0, 0x7d, 0xff, 0x81, 0x3cc0, 0xee, 0x8, 0xff, 0x9, 0x8, 0x800, 0x3, 0x1, 0x4, 0x2ed, 0x0, 0x4, 0x7, 0x20, 0x100, 0x80, 0xffff, 0x200, 0x80000000, 0x7, 0x4, 0x111f], [0xd35f, 0x7fffffff, 0xa0000, 0x3ff, 0xb7f1, 0x1, 0xde1, 0xffff, 0xffff, 0x8, 0xfffffffb, 0x0, 0x1, 0x9, 0x3, 0x3, 0x6, 0xffffffc6, 0x3, 0x6, 0x80000000, 0x4, 0x842d, 0x6cdb, 0x0, 0x3f, 0x7, 0x2, 0xc7, 0x5, 0x2, 0x7, 0x9, 0x3, 0x242f, 0x7fff, 0x80000000, 0x1000, 0x5234, 0x3, 0x2, 0x0, 0x80000001, 0x5, 0x2, 0x4, 0x1ff, 0xfff, 0x84, 0xffff290a, 0x1000, 0x7, 0xd, 0x10001, 0x9, 0x6, 0x3, 0x7, 0x7f, 0x2, 0x110, 0x4, 0x100, 0x8000], [0x6, 0x6, 0x2, 0x0, 0xfffffffa, 0xffffffff, 0x7f, 0x7ff, 0x5, 0xf4, 0x3, 0x1, 0x7fffffff, 0x7, 0x7f, 0x5, 0x20, 0x0, 0x8001, 0x7, 0x200, 0x1, 0x9, 0x81, 0x101, 0x3, 0x1, 0x4, 0x40, 0xab35, 0x6, 0x5, 0x7, 0x0, 0x6ba77458, 0x7fffffff, 0x8, 0x6, 0x9, 0x80, 0x4, 0x4, 0x40, 0x80, 0x7, 0x9, 0x2, 0x1, 0xd110, 0x4, 0x101, 0x7f, 0x80000000, 0x6, 0xffff, 0x1000, 0x9, 0x6, 0x79, 0x8, 0x1ff, 0x8001, 0x9, 0x6], [0x400, 0x3411, 0x4, 0x5, 0x7fffffff, 0x8, 0x8de, 0x3ff, 0xd91c, 0xfd9, 0x9d, 0x81, 0x7, 0x1, 0xffff, 0x4, 0x2, 0x4, 0xffffffff, 0x5, 0x9, 0x4, 0x8, 0xe3, 0x9cb0, 0x9, 0x4, 0x9, 0x7ff, 0x7fff, 0x2, 0x1000, 0x9, 0x2, 0x10001, 0x7ff, 0x7, 0x8, 0x1, 0xffffffff, 0x1, 0x8, 0xfaea, 0x3ff, 0x26a, 0x0, 0x2, 0xffff, 0x9, 0x9, 0x800, 0x5, 0x9, 0x820f, 0x7, 0x6, 0x9, 0x8, 0x5, 0x7f, 0x8000, 0x5, 0x1f, 0xcd], 0x12, ['%\x00', ',wlan1\x00', 'keyring}\x00']}, [""]}, 0x434}, 0x1, 0x0, 0x0, 0x40000}, 0x24040004) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:36 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:36 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:37 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:37 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f06572"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:37 executing program 4: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000001c0)={@loopback, 0x1326, 0x0, 0x1, 0x2, 0x1000, 0x8000}, 0x20) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000240)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x4004556e, &(0x7f0000000000)) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000440)={0x9e0000, 0x6, 0x4a, 0xffffffffffffffff, 0x0, &(0x7f0000000400)={0x9a0910, 0x80, [], @value64=0x4}}) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000480)={"ef14174796a620d13e56fc612abfc2d7c45877cf2042871503f31a78e226965ed5f18b94afda696cc6d97b0da2054e0da7052cf184f3406b1922b27b85e8785fb5b2101556d02e4306c0ad8c1f3b369d3e632611621e6cea1d1883a0115548d1ab3ddbb059e5624439341c1ac2ba25b8e6912d1c653e904261b53990672ec0626e4148fb86f9254302fc36fd9319736e22cb602d3f659b2ea592c6e474b571ee7fe406ef6ae15cbace463d85a9de57552065fb1808a835f5e17b43bf7f3ee49858e91007a04c8c175042ecae378dfc379d9730ee373da9471d3cd9d55b3fb05fbf3cf279a53cc802eb701a055b8820782fe1850d7787b60f1ffb5b4a57e6c90d72698d626d14f454f1f969c4636dcd6a2495ba6ea66ef39b6eaa11d0f9dbf6f7cb2b7a1acd78ebc1b39e7dc521d6de7a5d8198086b9d036d320aab69378567d72b1b2c90452f136db27cd33d7bb1857878e1fa141208e2f0505f3d08fe0e39032a096cec80e6c3a35fa15a0e36bd2f4709356d35c1212ec0a7320bd7b5030f0ccb3d1979d665d2feb101c71edc5d59cffdf6f3cd82397b88cdba70adf772d22b252a1ae9e01348e5f065f134ab73088d1f1d3bc715d795d6032699fdbe5fcdfa47687f42a2d74e2dc3d165109e0f93b74718eabca133cdc88a29267120c5d0ca5ba4804326800ba32fe47854de64baca838519f2c9dc6d952fcaa678482a980eadbc18ca544ac3b0c0cd6f62fd1279ea1dc2e08c6b430de4ab55d8949a1959e68077fdb4b5305ae8cb669011c838c4bfa544a095d9338dec034aa5fcaffb841b91d991e38976b4fc171539f3c867a21a2a03b211dbb1492b1e68bd127d1ad9748c902891ba32d921474cc067c7c0e5fe5ba2d88c2f07fcc69679193d34cd1c043895ca1d102a8df499223faedc0411b612f82f9d6c17d0eb20647d4d0754bd0e820d0b499db17d81497b4690e92e0f118e4b3b7d074cfd65fd7406038af444b4cafbcd94ad771bcf0a20405bb7e317b38b7485e480331ab0e2fc61cc3f5f7102f8901370b6c676cfc5c026b98a9333f295bbd1c0a9c2afb135f6c9ec094f533aae897483d326973cdc6d504f56a080b973a9d52173893fa52b048deea1e1abd2d42ec981d8f75a5d2797030f229751f77eb16534f25e777725a53bec51789884fc97be46d1a135795c1e500184cf74b4fd16e7096a4085d4f7735f90d991741584b8661f25d0053b25872d207f4a85fd0947fecfffadce48cb591dba42bdb7b129d5bca6051bc8af65143e3b1412487a85d19d35ba1397bfff458b773344db3cd23e8974cd7f848368f3a2f9fe8ccc35f07c221e517fa2cde18684459e23313a1afb38bc64cbf05d0658823dc1b93b4ee937308eb6db37c20116f7f65fc6f0e3f1a5ed5c495231ccb1a91b3d2a982e6ff8eb5d96aa314f448a366e1e2b5dbf59"}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x3, 0x0) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000380)=0x200) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0xff, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x80}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r2, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:37 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x0) 04:45:37 executing program 0: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x100, 0x3, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x4884, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="369ad6a47f3dc5372019702755f6a170e5ba38b70a0000002902007b00000080029200ee040000050000000000007d33002e2f66696c65382f66696c650f2f66696ccf60"], 0x36) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000240)={0x14, 0x69, 0x1, {0x0, 0x3, 0x4}}, 0x14) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) socket$nl_audit(0x10, 0x3, 0x9) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:37 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x2, 0x7, 0x0, 0x5, 0x0, 0x2, 0x12, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8b04, 0x2, @perf_config_ext={0x5, 0x101}, 0x8, 0x5, 0xea, 0xb, 0x4, 0xffff, 0x1000}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:37 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:37 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e63"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:37 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:37 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x7, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f00000004c0), 0x2bd, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x1000000000004e24, 0x0, @private1={0xfc, 0x1, [], 0x1}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) 04:45:37 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x100, 0x10000000, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x18, &(0x7f0000000240)=ANY=[@ANYRES32=r2, @ANYBLOB="000000fe1e00d2"], &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000400)={r2, 0x7e, "dbad7986f1d412b84533cda9995331de188d2295b5000d9b144405e715276e775f2a8141b519c5253344d67a33fa91253a87371d306f8fe990ef286a4202d8a3719c8fcffacc998dc4b130d962f46874c8dfe9749a16252cc24d4286f9208217beabc1fe8e090d2ad3cbe6d9f6f3649313fa63b930a3a8d931730b4016a2"}, &(0x7f00000001c0)=0x86) r3 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r3, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:37 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:37 executing program 4: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000001c0)={@loopback, 0x1326, 0x0, 0x1, 0x2, 0x1000, 0x8000}, 0x20) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000240)='./file0/file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x4004556e, &(0x7f0000000000)) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000440)={0x9e0000, 0x6, 0x4a, 0xffffffffffffffff, 0x0, &(0x7f0000000400)={0x9a0910, 0x80, [], @value64=0x4}}) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000480)={"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"}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x3, 0x0) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000380)=0x200) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0xff, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x80}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r2, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:38 executing program 0: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x400, 0x2000000000000}, 0x4811, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0xfffe}, 0x0, 0x8, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:38 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e63"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:38 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:38 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x100, 0x10000000, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x18, &(0x7f0000000240)=ANY=[@ANYRES32=r2, @ANYBLOB="000000fe1e00d2"], &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000400)={r2, 0x7e, "dbad7986f1d412b84533cda9995331de188d2295b5000d9b144405e715276e775f2a8141b519c5253344d67a33fa91253a87371d306f8fe990ef286a4202d8a3719c8fcffacc998dc4b130d962f46874c8dfe9749a16252cc24d4286f9208217beabc1fe8e090d2ad3cbe6d9f6f3649313fa63b930a3a8d931730b4016a2"}, &(0x7f00000001c0)=0x86) r3 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r3, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:38 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:38 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e63"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:38 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:38 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$l2tp6(0xa, 0x2, 0x73) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_usb_connect(0x261815dac02d73de, 0x761, &(0x7f0000000580)={{0x12, 0x1, 0x200, 0xce, 0x3b, 0xf5, 0x40, 0x499, 0x102b, 0xc128, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x74f, 0x3, 0x6, 0x61, 0x80, 0x42, [{{0x9, 0x4, 0x1b, 0x7, 0xb, 0xc3, 0xb3, 0xb1, 0x5, [], [{{0x9, 0x5, 0x5, 0x10, 0xede41596fd857a5e, 0x5, 0x4, 0x64, [@generic={0x8a, 0xb, "da72d7492c3c597b9baf71c4ac2b09fd1da1fa0dec22d116f005145932d2fb07897484f13fb43b6ba5d38c1a6fe8feda8d3764e958bd01561dd2dc6a07995dee641fb379785e7eb52b9939431736defea917f5d4d699f5f9e8731e6318d6335e0bb7a57e1b3bef30f7c1e314c44c6ba338ce4d75dc008dfc8c65d64e575a918302d0a75d9582174a"}]}}, {{0x9, 0x5, 0xc, 0x10, 0x10, 0x3, 0x40, 0x53, [@generic={0x8b, 0x7, "12731b18ffccf0f3a89f4588b70477bca2cdec3fef7f017cdea759f6016a6c43af49e749846e6882c29721b985b78880fe27daef0755b1c83a78dea6ed1c06ad6db4e282ea372899b2700287af0cfec2c3ab23ca7d87cdab6b3109decb99bcf21c32917fa7e467b7366ae9fe6ab35ec1335b37415c32463a543ddfd0edaf503c00fa2d13142ac2d7d4"}]}}, {{0x9, 0x5, 0x2, 0x4, 0x400, 0x1, 0x3f, 0x1f}}, {{0x9, 0x5, 0x3, 0xc, 0x400, 0x2a, 0x7, 0xd8, [@generic={0x94, 0xb, "764104ebcfe0976a48c0753d7617f86abd57c13370084e1807c4300ab6aced5abbbdbc12d838db921591341470856988cc11adce2104f0dd364dfdf8dff45c1d4d8677797967f2bfad5fb92abf40c521466a98a5d6a7071baee970f71e2394697ac93a0291b9311aecc463a42f5cbc56359b2515b470faf610ac365954b2d781c163ad2ca442026918a35f8c4060dc2f6c73"}]}}, {{0x9, 0x5, 0x85, 0x0, 0x200, 0xac, 0x4, 0x8, [@generic={0x80, 0x7, "12a3620e8bf2f3807389b5946714855184319a46e37b61b6c8481ee53a4c821ce1d54c43da7b0731526c1ad77a341606e7ea8d8d9bb0bde8f954e3973058cd4e717df6fdb6efb9636a850b30a48bd8ab1b74c00f5f912d5a2969f0c1366bdd063e14b8a4003ad9f70208309d762a55817f14bd37d641edad5b1d9056b484"}]}}, {{0x9, 0x5, 0xf, 0x10, 0x8, 0x6, 0x0, 0x40, [@generic={0x3e, 0xa, "6dd85ca23cd8e7e9c0aacbc77f3b868b5fa51f5e6d9c80d1290884c84f5821a2cb2a61a935e4a8babf0ce6909e7cbf61580d14cc15919433c3108d3a"}, @uac_iso={0x7, 0x25, 0x1, 0x83, 0xe9, 0x64a}]}}, {{0x9, 0x5, 0x0, 0x10, 0x8, 0x1, 0x2, 0x6a, [@generic={0xf4, 0xa, "141c8797185bd81f02bc57d77562291b12ac656175ccc33c2ab38ee922393ad60d319fc4f909c87d4e7b5a09ca070d28c15e2f84f3885f890890e4118051abc90d6b426c7d52da6c05f6494494136582d54b849c0039eb7420717f1d689832e967666d6ec996ecda272e4a0b084c7e604a8a9e682aabdef64169ccc460337b425dc1662b946e7a75b47aff51dfe03804a50e577152ee7f728d5e0876067ca744b43ef051a2da229cd768681ec51050de41e1a7c3a6baa2bc99afe1ad818458788849b31249ed9d6cad5d20f8176cf44a17d78c9b63e6f2021ac1a04b55966230fe7e9033bb0d4abc273492c3273da53e47c9"}, @uac_iso={0x7, 0x25, 0x1, 0x2, 0x20, 0x401}]}}, {{0x9, 0x5, 0x80, 0x10, 0x20, 0x3, 0x7d, 0x4a, [@uac_iso={0x7, 0x25, 0x1, 0x80, 0x3f, 0x9}, @generic={0x8e, 0x7, "aae6aa51a8a8edca31939d3280165046be74afa44787dd717e5b9afb4f0f62e6355ae9324057b7a1d8eab60aafe0651c5d282d0071e558d2d5e4b368f32059ea2f9585d448e703a037a1667190fb02c2a0058c7083a551f029a7615f4cc2dde4995e004a9c02e4128d1a5d050b3be1049a6d9b6be69e22fb77270e6370bf514a1f3294adf48199df0a7217f4"}]}}, {{0x9, 0x5, 0xb, 0x1, 0x10, 0xff, 0x4, 0x20, [@uac_iso={0x7, 0x25, 0x1, 0x80, 0x1, 0x7f}, @uac_iso={0x7, 0x25, 0x1, 0x2, 0x9, 0x7fff}]}}, {{0x9, 0x5, 0x5, 0x0, 0x20, 0x8, 0x3f, 0xbb, [@uac_iso={0x7, 0x25, 0x1, 0x80, 0x1, 0x3ff}, @generic={0x37, 0x7, "479c9de85e1a4dcea704deb4e6e184b50dfc75c45c021d265df3e6a0c311248d17e17f291667f0aa4fec40619cddf1db2a514fdede"}]}}, {{0x9, 0x5, 0xb, 0xfcad89cb6c350b0c, 0x8, 0xfc, 0xd9, 0x53}}]}}, {{0x9, 0x4, 0xe2, 0x8, 0xb, 0xff, 0xff, 0xff, 0x9, [@uac_as={[@format_type_i_discrete={0xe, 0x24, 0x2, 0x1, 0x3, 0x2, 0x2, 0x9c, "52828822b67e"}, @format_type_ii_discrete={0x11, 0x24, 0x2, 0x2, 0x5e9, 0x8, 0x4, "d1dcbad0a0bbe8a4"}, @format_type_i_discrete={0x10, 0x24, 0x2, 0x1, 0x8, 0x4, 0x40, 0x4, "6aae3c009d8e8985"}, @as_header={0x7, 0x24, 0x1, 0x7f, 0xb2, 0x5}, @format_type_i_continuous={0x9, 0x24, 0x2, 0x1, 0x81, 0x4, 0x15, 0x3, "1a"}, @format_type_i_continuous={0xb, 0x24, 0x2, 0x1, 0x8, 0x3, 0x2, 0xff, 'e', "1083"}]}, @uac_as], [{{0x9, 0x5, 0xb, 0x17, 0x200, 0x3}}, {{0x9, 0x5, 0x0, 0x2, 0x200, 0x2, 0x0, 0x40, [@uac_iso={0x7, 0x25, 0x1, 0x81, 0x1f, 0x1}]}}, {{0x9, 0x5, 0x0, 0x10, 0x200, 0x5, 0xfb, 0x9}}, {{0x9, 0x5, 0x80, 0x4, 0x39f, 0xd6, 0x6, 0x1, [@generic={0x50, 0x22, "38e52cea58562c15eb15644d9067961259e6eb114ab8ae18924eab7c63d2ce938c69ecd9984ac29725ff24d285f9478aad89ebc960b60dcd097655a14c213026fcee011ecbc1d0e4633eba61871d"}, @uac_iso={0x7, 0x25, 0x1, 0x80, 0x3, 0xdd9e}]}}, {{0x9, 0x5, 0x5, 0x10, 0x8, 0xff, 0x80, 0x2}}, {{0x9, 0x5, 0x4, 0x0, 0x20, 0x0, 0x4e, 0x40, [@generic={0x10, 0x22, "5cda7ff1f5617db2c2736c11c047"}, @generic={0x4f, 0x9, "4645087c303d06200d4cd72c7993c4831c083c652d906275ba732c60dca6a5549990435024c8f6608f22751438ced6958fe25ccbfa14185c1bd2849910c2070432a69d4844386f8af59c72e4d1"}]}}, {{0x9, 0x5, 0x9, 0x0, 0x20, 0x87, 0x1, 0x6}}, {{0x9, 0x5, 0xc9f41919a9158563, 0x3, 0x3ff, 0x5, 0x94, 0x7f, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0x5, 0x7ff}]}}, {{0x9, 0x5, 0x4, 0x4, 0x40, 0x9, 0x38, 0xff, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x5, 0xfff8}, @uac_iso={0x7, 0x25, 0x1, 0x81, 0x7f, 0xffff}]}}, {{0x9, 0x5, 0x6, 0x2, 0x40, 0x80, 0x1f}}, {{0x9, 0x5, 0x6, 0x0, 0x40, 0x6, 0x3, 0xba, [@generic={0xaf, 0x23, "5394f3d020f85b2379249e1a0f73d422e292bf209de7c6d54f91c1adb9b7e1d32a14486b13a1f65057fed2ff103a43bd6e31a31ac839155ec75c40b12fd258bffec941ff929ef81901247ad713b33f31585ffd8fda35ff78457d2616e0b0a33751e9368aedac156a5c1722ee302f23560c9269e69486c60dc412f0e6a8d95c3b6f7f4b6895bb26c80ef82d478361efe99522ef58b2e92045ac54201871ae3a1cc78627024f6f7a9aefd086c17e"}, @uac_iso={0x7, 0x25, 0x1, 0x2, 0x6, 0x40}]}}]}}, {{0x9, 0x4, 0x3, 0x8, 0x5, 0xca, 0x9, 0x61, 0x1, [@uac_as], [{{0x9, 0x5, 0x4, 0x0, 0x3ff, 0x9, 0xa6, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x3}, @uac_iso={0x7, 0x25, 0x1, 0x3, 0x1, 0x7}]}}, {{0x9, 0x5, 0xe, 0x19, 0x3ff, 0x3, 0x8, 0xfc}}, {{0x9, 0x5, 0x6, 0x10, 0x20, 0x1f, 0x3, 0x3}}, {{0x9, 0x5, 0x6, 0xc, 0x20, 0xff, 0x1a, 0x3a}}, {{0x9, 0x5, 0x5, 0x2, 0x400, 0x7f, 0x0, 0x8, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x9f, 0x4}, @uac_iso={0x7, 0x25, 0x1, 0x81, 0x28, 0x3}]}}]}}]}}]}}, &(0x7f0000000d00)={0xa, &(0x7f0000000380)={0xa, 0x6, 0x250, 0x2, 0x1, 0x7, 0x10}, 0x107, &(0x7f0000000e00)={0x5, 0xf, 0x107, 0x6, [@ssp_cap={0x14, 0x10, 0xa, 0x7, 0x2, 0x6, 0xf00, 0x0, [0xff3f30, 0x3f00]}, @ptm_cap={0x3}, @generic={0xb6, 0x10, 0xa, "2eff565ef7be87626d41179b375bbd7150ac773dd0ff8c327f9b72fa8e7d5b275dbb93aaf2c9f3149b8f817091000b186e02c5a677270ddff0c3cd88cd27ed3c9f74d0c8a8a95263c7c4ef027fb4b16fa69428455deb00779fd7a6daa0e27c3d7f3eefb3d39143eb345af3e996078a24f69cc6fd329cbc929787a3e2d4bd7375f07814f2e73aad370fc00340645d1cbb2aa24a147f76deee7d7e16bf57b29c473e18eb9bd6ed9a2f1700"/179}, @wireless={0xb, 0x10, 0x1, 0xc, 0x20, 0x3f, 0x2, 0xf19, 0x3f}, @ssp_cap={0x20, 0x10, 0xa, 0x28, 0x5, 0x3, 0x0, 0x8, [0x3f18, 0x0, 0xff000f, 0xf0, 0xf0]}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x8, 0x9b, 0x0, 0xfff7}]}}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0xc0, 0x0, &(0x7f0000000480)=[@acquire_done={0x40106309, 0x3}, @register_looper, @transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x68, 0x18, &(0x7f0000000400)={@fda={0x66646185, 0x8, 0x0, 0x5}, @fda={0x66646185, 0x9, 0x2, 0x2c}, @ptr={0x70742a85, 0x1, &(0x7f00000001c0)=""/54, 0x36, 0x2, 0x33}}, &(0x7f0000000240)={0x0, 0x20, 0x40}}, 0x40}, @decrefs={0x40046307, 0x1}, @increfs_done={0x40106308, 0x3}, @acquire_done={0x40106309, 0x3}, @acquire_done={0x40106309, 0x3}, @release={0x40046306, 0x2}, @clear_death], 0x0, 0x0, &(0x7f0000000380)}) 04:45:38 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r3 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r3, &(0x7f0000000180), &(0x7f0000000200)=0xc) 04:45:39 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) [ 1500.884492][T25726] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. 04:45:39 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:39 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x100, 0x10000000, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) read$eventfd(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x18, &(0x7f0000000240)=ANY=[@ANYRES32=r2, @ANYBLOB="000000fe1e00d2"], &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000400)={r2, 0x7e, "dbad7986f1d412b84533cda9995331de188d2295b5000d9b144405e715276e775f2a8141b519c5253344d67a33fa91253a87371d306f8fe990ef286a4202d8a3719c8fcffacc998dc4b130d962f46874c8dfe9749a16252cc24d4286f9208217beabc1fe8e090d2ad3cbe6d9f6f3649313fa63b930a3a8d931730b4016a2"}, &(0x7f00000001c0)=0x86) r3 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r3, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:39 executing program 0: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x2, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:39 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:39 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:39 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:39 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:39 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r3 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r3, &(0x7f0000000180), &(0x7f0000000200)=0xc) 04:45:39 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) [ 1502.211181][T25779] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. 04:45:41 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/input/mice\x00', 0x100) read$hidraw(r0, &(0x7f0000000400)=""/108, 0x6c) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000240)={0x3, 0x9}) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r2, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:41 executing program 0: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) socket$nl_audit(0x10, 0x3, 0x9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') 04:45:41 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:41 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:41 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) 04:45:41 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:41 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r3 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r3, &(0x7f0000000180), &(0x7f0000000200)=0xc) 04:45:41 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:41 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f06572"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:41 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:41 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065722e636d645369"]) 04:45:41 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) r1 = getuid() syz_mount_image$btrfs(&(0x7f00000001c0)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x3, 0x8, &(0x7f0000000800)=[{&(0x7f0000000400)="ca8e820ed029b7b2346bb647b1429031dbdd48d93c3f0d845b8f259213efad65824e6c90300ed1de2ca24b86b0a63c2304fa8f8d7d347f8da11ffbc15eb363c424102053eb89396d3b42498d75d79acb7debbda9de5a47010185d295372b443125c5035f9eb52879a7e09d231b62d03a9cb841122b53e4224c418b85c9589e728f0a5dbb49d0f12e1bb977f3bca68fbd9e7765a37a8a0a2a00da5f82143883438266da0de3a00c4869618e60eccf20be2392b352c592415055cfcaa50f8ef74a", 0xc0, 0xb58}, {&(0x7f0000000380)="37a14114a370d5cbf7d88ef2506101b20568771306adf3528daf501b96a9555ebf3ffdf75dd48a11a8ed15db4accb9dd815e95a764e2ab46c532", 0x3a, 0x6}, {&(0x7f00000004c0)="7268e713cc4ff3a70c98b8eca51f89bea9569b4bbcd2cd80f30f8c3f0a6f2a0022170509e8914e080d4bd5e112ac88d29ed0dd7b04beff9946d070682d202bada35bd1d49797f8b7b2a287c440fab0e0d07663785b8fe307c82405af3ce1b4692c8f35c4cf772932e84a36fe95c16f5673914a6abd767da60f0685b9138c52ac6a4bfc65abf8fb171cb6ce39b56a306670c14133f1db189e535d2f680b1912edc6f49897d3aad5da1bc4", 0xaa, 0x5}, {&(0x7f0000000580)="6ad9218e93470683b8460f529346bfcdaef1e3de31d36df0718256e3e6e2c951dc56099b00cf39a73a0706e09e436a02a9cdf8b0d143639334ec3fadf5697d8b86d451d835dcac053408198bab519aaf4eaf317d69b530021df4a7b97578e2bd6d261cad", 0x64, 0x2}, {&(0x7f0000000600)="5aee46d8e4b4044f1de16140a1a18f38baed148278c0e44b270a08e4dc71ef7e6e0832b6b689909fa782b6904dff0f04dd4fe4177336af919e251a0788db5a3af8acb1f89212", 0x46, 0xfffffffffffffffc}, {&(0x7f0000000680)="32890acb06477c", 0x7, 0x6c1}, {&(0x7f00000006c0)="152a380cf60719cd6d6eb7050b234386125a3387130b1eaec089bb18", 0x1c, 0x392}, {&(0x7f0000000700)="485c0db0dd99c27daea5316a91eca724f139c9bc99ad3478d0ed42aba675eda3c73b13be46d55932d79c695b941fcc89264d6472e88e8fb6c162b1729c5dd685f86b13a7136572b431443107bafec67e3a2c117a17ab5047344034a80e84c9695ba693746be92f729775586e5b75f7aa3d46fabcb6c0aa2dc1e55e8df4ac1924d11097f1784c6f30e06554470df4ae50f7bab143706e1091bd38398d18ad54806f1db9d539b2f6f9b8bcbb384b8a904b5dee734bed48e91629d0e35e0ef9567f5a4a7be192cd26a040c8ff59816b5a4e2e5ec46721bacaccd0473cf8", 0xdc, 0x4}], 0x20, &(0x7f00000008c0)={[{@user_subvol_rm='user_subvol_rm_allowed'}], [{@permit_directio='permit_directio'}, {@uid_lt={'uid<', r1}}, {@permit_directio='permit_directio'}, {@appraise='appraise'}]}) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:41 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:41 executing program 0: mmap(&(0x7f0000008000/0x3000)=nil, 0x3000, 0x2, 0x10, 0xffffffffffffffff, 0x31642000) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) [ 1503.551784][T25824] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. 04:45:42 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:42 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:42 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) sendmsg$NL80211_CMD_NEW_STATION(r0, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x48, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@NL80211_ATTR_STA_WME={0x34, 0x81, [@NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x5}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x6}, @NL80211_STA_WME_UAPSD_QUEUES={0x5}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0xff}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x1}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x2}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x8040}, 0x40) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:42 executing program 0: mmap(&(0x7f0000008000/0x3000)=nil, 0x3000, 0x2, 0x10, 0xffffffffffffffff, 0x31642000) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x3) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:42 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) socket$nl_audit(0x10, 0x3, 0x9) 04:45:42 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:42 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000440)={0x178, r1, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0xa4, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'erspan0\x00'}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x30}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x7, @mcast1, 0x439}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}}}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}]}, @TIPC_NLA_LINK={0x28, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}]}, @TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x20, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}]}, @TIPC_NLA_SOCK={0x6c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x1a6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xfffff3b9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xffffffff}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6d00}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1000}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8001}]}]}, 0x178}, 0x1, 0x0, 0x0, 0x40400d0}, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x40, 0x0) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000240)={0x3, 0x2, 0xd4b8d21, 0x9, 0x4, "f655973ee75f867544f3555dbfcb81196f7695"}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r3, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:42 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f0"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:42 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00', @ANYRESHEX=r0, @ANYBLOB="2c63616368653d6673636145f3b02608a559f5866368652c646f6e745f6d6561737572652c736d61636b66736861743d2a7b2a5c73656c662d2c646f6e745f6170707261596d11c070b66973652c66736d616769633d3078303030"]) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) fanotify_init(0xc, 0x0) 04:45:42 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:43 executing program 0: mmap(&(0x7f0000008000/0x3000)=nil, 0x3000, 0x2, 0x10, 0xffffffffffffffff, 0x31642000) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x7e, 0x8, 0x40, 0x0, 0x0, 0x0, 0x9021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffa190ff50, 0x2b8}, 0x706, 0x2, 0x0, 0x0, 0x7fff, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) setuid(0x0) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) [ 1504.681896][T25866] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. 04:45:43 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f0"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:43 executing program 3: mmap(&(0x7f0000008000/0x3000)=nil, 0x3000, 0x2, 0x10, 0xffffffffffffffff, 0x31642000) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x7e, 0x8, 0x40, 0x0, 0x0, 0x0, 0x9021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffa190ff50, 0x2b8}, 0x706, 0x2, 0x0, 0x0, 0x7fff, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x85, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000200)=0x5) setxattr$security_capability(&(0x7f0000000440)='./file0/file0/file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x4, 0xfe}, {0x3ff, 0xd86}], r2}, 0x18, 0x1) 04:45:43 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) [ 1504.915278][T25872] 9pnet: Insufficient options for proto=fd 04:45:43 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(0x0, 0x3) 04:45:43 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) 04:45:43 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:43 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f0"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:43 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:44 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) socket$nl_audit(0x10, 0x3, 0x9) 04:45:44 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:44 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) [ 1505.937031][T25911] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. 04:45:44 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065"]) mount$bpf(0x20000000, 0x0, 0x0, 0x87f810, 0x0) 04:45:44 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:44 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x80401, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x4e22, 0x101, @dev={0xfe, 0x80, [], 0x2d}, 0x7}, 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$VFIO_CHECK_EXTENSION(r2, 0x3b65, 0x4) [ 1506.159417][T25922] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:44 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065"]) mount$bpf(0x20000000, 0x0, 0x0, 0x87f810, 0x0) 04:45:44 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:45 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:45 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:45 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x80401, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x4e22, 0x101, @dev={0xfe, 0x80, [], 0x2d}, 0x7}, 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$VFIO_CHECK_EXTENSION(r2, 0x3b65, 0x4) 04:45:45 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x4004556e, &(0x7f0000000000)) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000400)) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000440)={0x1}) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x248080, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f00000001c0)='./file0/file0\x00', r2}, 0x10) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) [ 1507.111334][T25957] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. 04:45:45 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) socket$nl_audit(0x10, 0x3, 0x9) 04:45:45 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:45 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065"]) mount$bpf(0x20000000, 0x0, 0x0, 0x87f810, 0x0) 04:45:45 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x80401, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x4e22, 0x101, @dev={0xfe, 0x80, [], 0x2d}, 0x7}, 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r1 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$VFIO_CHECK_EXTENSION(r2, 0x3b65, 0x4) 04:45:45 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x4004556e, &(0x7f0000000000)) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000400)) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000440)={0x1}) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x248080, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f00000001c0)='./file0/file0\x00', r2}, 0x10) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:46 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:46 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) 04:45:46 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x0, 0x0) [ 1507.749446][T25972] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:46 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:46 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x40, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:46 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x4004556e, &(0x7f0000000000)) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000400)) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000440)={0x1}) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x248080, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f00000001c0)='./file0/file0\x00', r2}, 0x10) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:46 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x0, 0x0) [ 1508.037750][T25992] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. 04:45:46 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) socket$nl_audit(0x10, 0x3, 0x9) 04:45:46 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:46 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x0, 0x0) 04:45:47 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)='0', 0x1}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x303}, "4101940008000083", "69c6c72e0bd784712f6c1f00", 'q\x00', "58d3c21fad3ebb88"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x4, 0x7fff}, 0x0, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:47 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x4004556e, &(0x7f0000000000)) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000400)) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000440)={0x1}) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x248080, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f00000001c0)='./file0/file0\x00', r2}, 0x10) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f0000000200)=0xc) 04:45:47 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:47 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:45:47 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) [ 1508.766676][T26013] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:47 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)='0', 0x1}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x303}, "4101940008000083", "69c6c72e0bd784712f6c1f00", 'q\x00', "58d3c21fad3ebb88"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x4, 0x7fff}, 0x0, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:47 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:47 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x4004556e, &(0x7f0000000000)) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000400)) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000440)={0x1}) socket$nl_audit(0x10, 0x3, 0x9) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x248080, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f00000001c0)='./file0/file0\x00', r1}, 0x10) [ 1509.169546][T26031] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. 04:45:47 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:47 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) 04:45:47 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:47 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)='0', 0x1}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x303}, "4101940008000083", "69c6c72e0bd784712f6c1f00", 'q\x00', "58d3c21fad3ebb88"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x4, 0x7fff}, 0x0, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:47 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x4004556e, &(0x7f0000000000)) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000400)) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000440)={0x1}) socket$nl_audit(0x10, 0x3, 0x9) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x248080, 0x0) 04:45:48 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:48 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000240)='./file0/file0\x00', 0x198) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$nl_audit(0x10, 0x3, 0x9) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0x91a8) mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x2, 0x0) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) [ 1509.729367][T26052] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:48 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:45:48 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:48 executing program 2: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:48 executing program 1: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, &(0x7f0000000180), &(0x7f0000000200)=0xc) umount2(&(0x7f0000000040)='./file0\x00', 0x3) 04:45:48 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x4004556e, &(0x7f0000000000)) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000400)) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000440)={0x1}) socket$nl_audit(0x10, 0x3, 0x9) [ 1510.094254][T26072] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. 04:45:48 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:49 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:49 executing program 2 (fault-call:6 fault-nth:0): setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:49 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:49 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x4004556e, &(0x7f0000000000)) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000400)) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000440)={0x1}) 04:45:49 executing program 1 (fault-call:8 fault-nth:0): setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:49 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:45:49 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:49 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) [ 1511.187718][T26105] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1511.231542][T26108] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:49 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:49 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x4004556e, &(0x7f0000000000)) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000400)) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(&(0x7f0000000340)='./file0/file0/file0\x00', 0x0) 04:45:49 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:49 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:50 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:50 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x30000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:50 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) 04:45:50 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:45:50 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:50 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="737376e3f065"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:50 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x4004556e, &(0x7f0000000000)) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000400)) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:50 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) [ 1512.281544][T26147] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. 04:45:50 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 1512.353435][T26154] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:50 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x40000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:50 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) [ 1512.648850][T26168] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. 04:45:51 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:51 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x4004556e, &(0x7f0000000000)) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000400)) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:51 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 1513.237558][T26181] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. 04:45:51 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:45:51 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="747376e3f065"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:51 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:51 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:45:51 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x2030000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:51 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x4004556e, &(0x7f0000000000)) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000400)) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) 04:45:52 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) [ 1513.951205][T26210] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:52 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:52 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x4004556e, &(0x7f0000000000)) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000400)) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 04:45:52 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:52 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x4030000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:52 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757576e3f065"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:52 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:45:52 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x4004556e, &(0x7f0000000000)) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000400)) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:45:52 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:53 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757365e3f065"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:53 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:45:53 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x6030000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:53 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x4004556e, &(0x7f0000000000)) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000400)) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') 04:45:53 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x8030000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:53 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) [ 1514.978084][T26252] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:53 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:53 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x4004556e, &(0x7f0000000000)) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000400)) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) 04:45:53 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f076"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:54 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:45:54 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:54 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x4004556e, &(0x7f0000000000)) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000400)) 04:45:54 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0xa030000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:54 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:45:54 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0xb0002, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000180)={0x9, &(0x7f0000000400)=[{}, {@none}, {@none}, {}, {}, {@none}, {@fixed}, {@none}, {}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:54 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:54 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000400)) [ 1515.839741][T26296] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:54 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000400)) 04:45:54 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0xc030000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:54 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:54 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r3, 0x4004556e, &(0x7f0000000000)) dup2(r0, r3) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:54 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:45:54 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000400)) 04:45:54 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:54 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x4004556e, &(0x7f0000000000)) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000340)={0x4, 0x80000000, 0x7527, r0, 0x0, &(0x7f00000002c0)={0x990a62, 0x0, [], @value=0x7fffffff}}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r2, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000400)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) setresgid(0x0, 0x0, r4) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000280)='fuseblk\x00', 0x2802418, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,\x00ser_id=', @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC=r4, @ANYBLOB=',allow_other,allow_other,default_permissions,\x00']) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r5, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8982, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800, 0x80000001}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000500)=ANY=[@ANYRESOCT, @ANYRESOCT=r2, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYBLOB="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", @ANYRES16=r0, @ANYRESOCT, @ANYRES32]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:54 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0xe030000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:54 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:45:55 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000400)) 04:45:55 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) [ 1516.815535][T26341] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:55 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:45:55 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000400)) 04:45:55 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000180)=0x9) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="07006ae3f065aeb6c1695c196787a6f2a3c922728ce94071ca802a29d78b5005eb07ad296ade96ad4e9fa8948bf63817f10a81f81b39e0ce0000"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:55 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x10030000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:55 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:55 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000400)) [ 1517.080768][T26358] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:55 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:45:55 executing program 3: mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000400)) 04:45:55 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000400)) [ 1517.380890][T26372] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:45:55 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:45:55 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r1) ioprio_set$uid(0x0, r1, 0x3) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="757376e3f0658303a2ecef4b574aed4a4d5632b2426f8506d75beb7d8f5a9fc653ed0d"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:55 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:55 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000400)) 04:45:55 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:45:55 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e24, @local}}, 0x24) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, r2, 0xc46dfc707e1df77d}, 0x14}}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000400)={0xc4, r2, 0x4, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xf0}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}]}, @TIPC_NLA_NET={0x48, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xc2f4696}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6b2b}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x10001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x272f80}]}, @TIPC_NLA_BEARER={0x34, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @l2={'ib', 0x3a, 'rose0\x00'}}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'eth', 0x3a, 'vlan0\x00'}}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x40000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f0000000180)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757476e3f065"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:55 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x12030000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:56 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000400)) 04:45:56 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:56 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000400)) 04:45:56 executing program 3: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000400)) 04:45:56 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:56 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:45:56 executing program 3: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000400)) 04:45:56 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x18, &(0x7f0000000040)={r2}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000001740)={r2, 0xbf, "5d98341fc6cb7a96142bb9a0c042b882b90d1fb52cf8c4b660fad79a304bd9eee92df3eb75e44743452dad82d5ed949f3c7db1b50493490477fa03e1a3b48efdbc7c3f6b17bd09fd8b042649c4df3ba98a5ae28c8343b9ae9b056d62b66714d2aab96f173f3e623643c450f9b0a6a468180a04d1a76bd8db9186cd0c8601e5a1a80cd2f0f25dd7dba351e02768168b21588917a7d2495058d0a6d33fbcc52e9671767ae3e858cf9ab937392809ca68a728e6e62e19ff1b01121f6d9997fc10"}, &(0x7f0000001840)=0xc7) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r3, 0x0, 0x0) recvmsg$can_j1939(r3, &(0x7f0000000200)={&(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000040)=""/4, 0x4}, {&(0x7f0000000340)=""/116, 0x74}, {&(0x7f0000000400)=""/4096, 0x1000}], 0x3, &(0x7f0000001400)=""/246, 0xf6}, 0x40000000) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000001540)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADD(r4, &(0x7f0000001600)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000015c0)={&(0x7f0000001580)={0x3c, r5, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @private2}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @ipv4={[], [], @private=0xa010102}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x14}, 0x40010) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) r6 = open(&(0x7f0000001640)='./file0/file0/file0/../file0\x00', 0x260000, 0x1c8) ioctl$SNDRV_PCM_IOCTL_WRITEI_FRAMES(r6, 0x40184150, &(0x7f0000001700)={0x0, &(0x7f0000001680)="b4c317a6b879e33ddc79850071046f86b6cdab0e6fc3f528ecf242d68a290ffcc2fa696fc6ff65a51a2dcb2901816a7934f0b59e576a1782e02bed7ad07a03fe517ad555305a41a8199cbe2ef3f2df27c0", 0x51}) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:56 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x14030000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:56 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:56 executing program 3: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000400)) 04:45:56 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:45:57 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:57 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, 0x0) 04:45:57 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x16030000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:57 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xe, r0, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:57 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, 0x0) 04:45:57 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:45:57 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:57 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, 0x0) 04:45:57 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x18030000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:57 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065"]) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000400)=""/188) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:57 executing program 3 (fault-call:1 fault-nth:0): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000400)) 04:45:57 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:45:57 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:58 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000400)) 04:45:58 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x1a030000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:58 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x2, &(0x7f0000000400)) 04:45:58 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:58 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:45:58 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_procfs(r0, &(0x7f0000000180)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) fspick(r1, &(0x7f0000000040)='./file0/file0/file0\x00', 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x208d000, 0x0) migrate_pages(r0, 0x9cf8, &(0x7f0000000280)=0x3, &(0x7f00000002c0)=0x2) perf_event_open(&(0x7f0000000100)={0x4, 0x2c, 0x9, 0x0, 0x0, 0x1, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) utime(&(0x7f0000000200)='./file0/file0/file0\x00', &(0x7f0000000240)={0xc2, 0xe2f6}) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00e4b22955c31cf0eb9ad74374bd6473855bcabdd0d209d5fff83e74926ba94849d1e0b22243f09364cb884a5f2fa80f72b97a845f549e8bd91a8d1538c11bd2d551e1641d5c803e2e34745d8caf68cea1997692599a3e851e58f98e8aeb6b61d0cc189cac68d68194710225ba5f90737548f53b1cac5d704b851c03ea7f433315ce2cfe97511138e4fbf53245ac9468f2aed932b9d3f46596573c2a99cc3fc38191ba9019a2ade897f729c1eebdbc036a101b1099247d669abab64222ea6796460a9ff308349e23d74b982400"/218]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) r2 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r2) ptrace$setopts(0x4206, r2, 0x0, 0x0) rt_sigqueueinfo(r2, 0x10, &(0x7f0000000340)={0x11, 0xff, 0x8}) 04:45:58 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x10, &(0x7f0000000400)) 04:45:58 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:58 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x1c030000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:58 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:58 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:45:58 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x4601, &(0x7f0000000400)) 04:45:58 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065"]) r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r1) r2 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r3) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0/file0\x00', &(0x7f0000000180)='overlay\x00', 0x80, &(0x7f0000000280)={[{@index_off='index=off'}, {@index_on='index=on'}, {@xino_off='xino=off'}, {@default_permissions='default_permissions'}], [{@uid_lt={'uid<', r1}}, {@fowner_lt={'fowner<', r3}}]}) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:58 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:58 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x1e030000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:59 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x4b35, &(0x7f0000000400)) 04:45:59 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:45:59 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:45:59 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x4b47, &(0x7f0000000400)) 04:45:59 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r1) quotactl(0x7fffffff, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000400)="2dd6b54b5db5365929422bd33d732a2662e6a5768304e462a15eb467427a9b826cb7caf7484175b6fba9837a576b34fdc5383503fe16455b5762ddaefeb017f9417ea5af1c4644297f61a9e8ec8e487321aab0dbbd3a7400169161b62d86fe8d2b9cb777107187217f6dfcce67733589a4dd8e1a1d16101df84cdfbe42706b6bf9c1e48e6a8c2e568530947e6aa51c251d281330dc0ccb5dc459b779") perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065"]) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r2, 0x0, 0x0) r3 = openat(r2, &(0x7f0000000180)='./file0\x00', 0x220200, 0x106) sendmsg$IPCTNL_MSG_CT_GET_STATS(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0xc, 0x0, 0x6}, ["", ""]}, 0x14}}, 0x20000004) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:45:59 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000002, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:45:59 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x4b49, &(0x7f0000000400)) 04:46:00 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:46:00 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) move_mount(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00', r0, &(0x7f0000000180)='./file0/file0\x00', 0x20) 04:46:00 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:46:00 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x4b63, &(0x7f0000000400)) 04:46:00 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000003, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:46:00 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x4b66, &(0x7f0000000400)) 04:46:00 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) close(0xffffffffffffffff) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 04:46:00 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:46:00 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x4c00, &(0x7f0000000400)) 04:46:00 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x4c01, &(0x7f0000000400)) 04:46:00 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:46:00 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x541b, &(0x7f0000000400)) 04:46:01 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:46:01 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(r0, 0x1, 0x53, &(0x7f0000000040), &(0x7f0000000180)=0x28) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:46:01 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000004, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:46:01 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x5421, &(0x7f0000000400)) 04:46:01 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:46:01 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x5450, &(0x7f0000000400)) 04:46:01 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) close(0xffffffffffffffff) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 04:46:01 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x5451, &(0x7f0000000400)) 04:46:01 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:46:01 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000005, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:46:01 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757300e3f065"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:46:01 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x5452, &(0x7f0000000400)) 04:46:02 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:46:02 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:46:02 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x5460, &(0x7f0000000400)) 04:46:02 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000006, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:46:02 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x6364, &(0x7f0000000400)) 04:46:02 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) truncate(&(0x7f0000000040)='./file0/file0/file0\x00', 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) ptrace$setopts(0x4206, r0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:46:02 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) close(0xffffffffffffffff) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 04:46:02 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x6609, &(0x7f0000000400)) 04:46:02 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:46:02 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000007, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:46:02 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x660c, &(0x7f0000000400)) 04:46:02 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x6611, &(0x7f0000000400)) 04:46:02 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:46:02 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:46:02 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x6612, &(0x7f0000000400)) 04:46:02 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) socket(0x10, 0x2, 0x3) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065"]) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x8) read$eventfd(r1, 0x0, 0x0) write$UHID_INPUT2(r1, &(0x7f0000000400)={0xc, {0x96, "ad6b6d2abfa323169e31b4d4a1a796d6aef0d7eb6be2f2a887566fd9142b6a659e195302023749a7a620626cd484d5c7eaa012874075a1f48230cd76960d11a2111a1b8ea4f4b0d877c4896839a9d9fd19798d2b91cc5d703d7a932246bd104e9968e999a8c8cfe7e29d5fb8efde3d4d8d2885c510bc0287273eb923500aace3e1b4ca0275cda7cadef0e14a56883242e6a6d82f5277"}}, 0x9c) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@initdev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000000340)='./file0/file0/file0\x00', &(0x7f0000000380)='9p\x00', 0x1000000, &(0x7f0000000700)=ANY=[@ANYBLOB="743ef26e733d6664ebbe850edb9300044b2b5ac6258f777415c1c91ef601ebcce9ea444a94b04dbf96023d89913e9a5b7c8798947c903e024800beb7185ab52163934686", @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',afid=0x0000000000000400,access=client,uid<', @ANYRESDEC=0x0, @ANYBLOB=',mask=MAY_READ,measure,fowner>', @ANYRESDEC=r2, @ANYBLOB=',\x00']) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) read$snddsp(r3, &(0x7f0000000280)=""/81, 0x51) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r4, 0x0, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r4, 0x12, 0x3, &(0x7f0000000200)=0x1, 0x4) 04:46:02 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000008, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:46:03 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x6628, &(0x7f0000000400)) 04:46:03 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:46:03 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:46:03 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x8912, &(0x7f0000000400)) 04:46:03 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000009, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:46:03 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x8933, &(0x7f0000000400)) 04:46:03 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) [ 1525.198963][T26757] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. 04:46:03 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:46:03 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="00427fbb00796a27cc8edd30f6d19f1eef724d8400"]) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000000040)={&(0x7f0000000400)="e3f85b6ce195f9e3eba9aad193eded35166d4abf4ec60949e8ea13c4906de443eef66ca120dc452d51d86a3833b2e3342a96e34e1abf4303c86a5a54d530ba550b8fa72b40860d72caee00001c477bf2d88bdac14b1bde6a57b042372e1c3ccba879ab53dcbda5997a30088ad4377c174abbee55b6c981822cf4066f074f7e03f5097b32137688f3ca00d2325f8b9c530761ab28bf94b0458acb9e9b756ab418704447b204ea7ad8f532d5b58eb8a385541db8da0158", 0xb6, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROYPROPBLOB(r0, 0xc00464be, &(0x7f0000000180)={r1}) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:46:03 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x894c, &(0x7f0000000400)) 04:46:03 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:46:03 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x2000001a, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:46:04 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x8983, &(0x7f0000000400)) 04:46:04 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:46:04 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:46:04 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x89e1, &(0x7f0000000400)) 04:46:04 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x81, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:46:04 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:46:04 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x89e2, &(0x7f0000000400)) [ 1526.248115][T26810] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. 04:46:04 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) close(0xffffffffffffffff) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 04:46:04 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x2000001c, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:46:04 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:46:04 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x89e6, &(0x7f0000000400)) 04:46:04 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x18, &(0x7f0000000040)={r4}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={r4, 0x800}, &(0x7f0000000180)=0x8) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="758776e3f065"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r5, 0x4004556e, &(0x7f0000000000)) r6 = dup3(r0, r5, 0xa752431f277b9220) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r6, 0xc08c5335, &(0x7f0000000400)={0xfff, 0x6, 0x0, 'queue1\x00', 0x800}) syz_mount_image$minix(&(0x7f0000000200)='minix\x00', &(0x7f0000000280)='./file0/file0\x00', 0x100000000, 0x6, &(0x7f0000000880)=[{&(0x7f00000004c0)="41c9266dc9770796c37292a3e59fb808342e8c71329322f0f28dafc25c3967ce24efc7ede2d09de1b884b677a5eefee2185c527726e0f341cdd12f76f914a8f97fbd9f4ff699edcecdea5cea63afeefc53faf79282a1c6719435ea0beed9c00dbd184c6993e9218629f01c7ce3dc859a37a9b8fd882000c1a78ed78b4ad5e59e622c24ca6e0a7184df4a5d6963b99b38c14d9a31fbeb23feb97974f9e30b41ee0f8a890821ae535ed67bf5bb7c675b5e9a39d7fae2d4a12b8e454848a2a0b2c71e24e905ebf8706b614d", 0xca, 0xfffffffffffffffa}, {&(0x7f00000005c0)="66ea1a4f3d84c27789942e04c5a07aea8b0250e9fa5a6a42db04a0ac844130ad19d6e91c641cb5e66d9fd680b145ee42bfea8a108b0ee5aba2e1ce3c2afac956c1a159c16368e2358f7d04d8686fe98287a87cad3a7747012a9408fd2741a96ada81ffd2c783fac0f7072f614b79d2216d6a413d32d24b019e6cabdcb27a9e881535c6bca1fd0bf393c57794326d00020c93b50fe3dc1d7772607667d18bf7f0c526c9c840dbe548b25a5cd1fcaec38d495ed610c513f3001ed20cb6ad3e2f6324cf83dcb34e2f7a299e7a175693df851941672397d61378959a4814", 0xdc, 0x3}, {&(0x7f00000006c0)="0f28076a518eca7854acc5cede2892b360b55c84426b05df64f4f1ae4631b1f813e435fe4666453e1159aca7db1d237467f71eccaf45f920676972e322c3880c3f438ba4903037dbdc65683cd681405364d3ab5936850e0b38b7dca1a8fc764cc31b6a616087531a10323e59a4b67814484792837356c6e143658f358c3c95716c6529fad216fe59429c3a427954ea820df08f4a4154e78c8ab22d1395207c8326f82a8c91f319b228a6f344c5f6deadce5364709d9778652f9d669c8c733e26d8ffd569cc3acf99de35f57abfdea7", 0xcf, 0x9}, {&(0x7f00000007c0)="58495ab4150a1504703fc95192e5237717e6b5b02dfccfb31b6971aa80388c648c4d6814a98ed7179ce22d942c0bfd83847308223558e517ae9cf09551f887cd71a7fdeee46f86dcb1b2b3225cea5bcdb5dbc503571ed2109fbc6a98c4805cafcafed94a1afa410d180e9765b09841a82804615678fd6c2be536609e1907994cac9e373b00a113d16415f58f62f0a27f28afbd00d5008bade86ebc2f7db75140b0a9be7a181ac08ed1c852cc090a0d0884cba7e3df7ac18f8c7f6cc7d06cd6d7", 0xc0, 0x5}, {&(0x7f0000000340)="503d07e62aa575b8e02a683dd0a16fd37faa8c0e34ddd52f73c155dd237049056750a01036369a001b9c51ce9e86e92334efec614f46d7936143ccc11fdf5f5440dd7abdeaa4b958a3efb994d48736778045ad729c9c94838f22f3", 0x5b, 0x7f}, {&(0x7f00000002c0)="6eb674cc52db2180d614", 0xa, 0xaa95}], 0x60, 0x0) 04:46:05 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0xae01, &(0x7f0000000400)) 04:46:05 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:46:05 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:46:05 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000040)=0x1, 0x4) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:46:05 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x2000001e, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:46:05 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0xae41, &(0x7f0000000400)) 04:46:05 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) [ 1527.221979][T26869] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. 04:46:05 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) close(0xffffffffffffffff) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 04:46:05 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0xae80, &(0x7f0000000400)) 04:46:05 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:46:05 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000022, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:46:05 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="0197000032431f01f3ffffff01000000720e1eec2882c4eec6e81182bd360ee5d0b9e13ebe63660c6ce23f1b641bd31c718b0a2e1b851e98118fd8f08b24d6da5c5d6f440000000000000000000000000053821d5c579931c368393e427cab37fd6ae7e00e8662398157b0c4d9d13a09a0b58de11864a23e1cb3ba77d721c3079e41cff40bcf6a2e995a23ec371954173193d9d9959b44558a6bad92193a1b6da8c076aa4f03aba5fd46ce63fce6bc46d338574e7bbabb95645b4a774a007e7cd67ab5163b9f2208755ffd8d21c6568bf855ec7542abbf9d1ba4d05a93829577f8aa2b6f879c00"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$gtp(&(0x7f0000000000)='gtp\x00') sendmsg$GTP_CMD_DELPDP(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000002580)={0x14, r2, 0x11}, 0x14}}, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @ipv4}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0x34, r2, 0x4, 0x70bd29, 0x25dfdbfc, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @multicast1}, @GTPA_LINK={0x8, 0x1, r5}, @GTPA_I_TEI={0x8, 0x8, 0x3}, @GTPA_MS_ADDRESS={0x8, 0x5, @local}]}, 0x34}}, 0x8000) 04:46:05 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x400454ca, &(0x7f0000000400)) 04:46:06 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x4004556e, &(0x7f0000000400)) 04:46:06 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x4ffe0, 0x0) 04:46:06 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:46:06 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x40046629, &(0x7f0000000400)) 04:46:06 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:46:06 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x40049409, &(0x7f0000000400)) 04:46:06 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) close(0xffffffffffffffff) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 04:46:06 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:46:06 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000024, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:46:06 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x4ffe0, 0x0) 04:46:06 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x40081271, &(0x7f0000000400)) 04:46:06 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xce52}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x4004556e, &(0x7f0000000000)) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r1, 0x4004556e, &(0x7f0000000000)) removexattr(&(0x7f0000000180)='./file0/file0/file0/file0\x00', &(0x7f00000001c0)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:46:06 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x4ffe0, 0x0) 04:46:07 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x40086602, &(0x7f0000000400)) 04:46:07 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:46:07 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000026, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:46:07 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:46:07 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x40086604, &(0x7f0000000400)) [ 1529.100554][T26959] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. 04:46:07 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:46:07 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:46:07 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f0000000040)={0x77359400}, 0x10) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x40100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0x4, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="7573eef065"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:46:07 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x40086607, &(0x7f0000000400)) 04:46:07 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000028, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) [ 1529.472546][T26969] EXT4-fs warning (device sda1): ext4_resize_begin:72: There are errors in the filesystem, so online resizing is not allowed 04:46:07 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x6609, &(0x7f0000000400)) 04:46:08 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) [ 1529.605850][T26983] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:46:08 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x2000002a, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:46:08 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x40087602, &(0x7f0000000400)) 04:46:08 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) connect$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @host}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:46:08 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:46:08 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) [ 1530.115134][T27014] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. 04:46:08 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:46:08 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x400c6615, &(0x7f0000000400)) 04:46:08 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:46:08 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x2000002c, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:46:08 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x4004556e, &(0x7f0000000000)) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0xa0}, r1, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:46:08 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x40106614, &(0x7f0000000400)) 04:46:08 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:46:09 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x40186366, &(0x7f0000000400)) [ 1530.657863][T27039] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:46:09 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:46:09 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x4018aebd, &(0x7f0000000400)) 04:46:09 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:46:09 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000050, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) [ 1531.120429][T27069] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. 04:46:09 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:46:09 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:46:09 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) link(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000180)='./file0/file0/file0\x00') mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) getpeername$unix(r0, &(0x7f0000000280), &(0x7f0000000340)=0x6e) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7}, 0x0, 0x80000000, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0/file0/file0\x00', &(0x7f0000000500)='bpf\x00', 0x200000, &(0x7f0000000540)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x80000000}}, {@mode={'mode', 0x3d, 0x86a}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x8}}], [{@func={'func', 0x3d, 'PATH_CHECK'}}, {@obj_user={'obj_user', 0x3d, '/dev/ubi_ctrl\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/ubi_ctrl\x00'}}]}) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000640)=ANY=[@ANYBLOB="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"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x80900, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000240)=0x5, 0x4) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x18, &(0x7f0000000040)={r4}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000400)={r4, 0x800}, 0x8) 04:46:09 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x401c5820, &(0x7f0000000400)) 04:46:09 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000052, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:46:09 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x4020940d, &(0x7f0000000400)) 04:46:09 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) [ 1531.628411][T27105] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:46:10 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x4020ae46, &(0x7f0000000400)) 04:46:10 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:46:10 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000054, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:46:10 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:46:10 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x40080, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="757376e3f065"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) [ 1532.047568][T27131] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. 04:46:10 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x4ffe0, 0x0) 04:46:10 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x40286608, &(0x7f0000000400)) 04:46:10 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:46:10 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000056, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:46:10 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x40, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="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"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) [ 1532.372707][T27147] EXT4-fs warning (device sda1): ext4_resize_begin:72: There are errors in the filesystem, so online resizing is not allowed 04:46:10 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x40305828, &(0x7f0000000400)) 04:46:10 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:46:10 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x20000058, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:46:11 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x4030582a, &(0x7f0000000400)) 04:46:11 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:46:11 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:46:11 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x40305839, &(0x7f0000000400)) [ 1533.009910][T27184] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. 04:46:11 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x4ffe0, 0x0) 04:46:11 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x40345632, &(0x7f0000000400)) 04:46:11 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:46:11 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) rmdir(&(0x7f0000000280)='./file0/file0\x00') write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x4ffe0, 0x0) 04:46:11 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) removexattr(&(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="c60000a80000"]) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) 04:46:11 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x40806685, &(0x7f0000000400)) 04:46:11 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) 04:46:11 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) read$eventfd(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000001c0)=0xfffffffc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) mount$bpf(0x2000005a, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0, 0x87f810, 0x0) umount2(0x0, 0x0) setuid(0x0) setxattr$security_capability(0x0, &(0x7f0000000380)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x0, 0xfe}, {0x3ff, 0xd86}]}, 0x18, 0x1) 04:46:11 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x4090ae82, &(0x7f0000000400)) 04:46:11 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000002c0), 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write(r1, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 04:46:12 executing program 4: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x4ffe0, 0x0) 04:46:12 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x6609, &(0x7f0000000400)) 04:46:12 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000280)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) [ 1533.776845][T27232] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1533.882530][ T7009] ================================================================== [ 1533.891529][ T7009] BUG: KASAN: use-after-free in unhash_mnt+0x3a6/0x420 [ 1533.898464][ T7009] Write of size 8 at addr ffff8880001101c0 by task syz-executor.2/7009 [ 1533.906695][ T7009] [ 1533.909029][ T7009] CPU: 0 PID: 7009 Comm: syz-executor.2 Not tainted 5.7.0-syzkaller #0 [ 1533.917259][ T7009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1533.927515][ T7009] Call Trace: [ 1533.930832][ T7009] dump_stack+0x188/0x20d [ 1533.935169][ T7009] ? unhash_mnt+0x3a6/0x420 [ 1533.939752][ T7009] ? unhash_mnt+0x3a6/0x420 [ 1533.944315][ T7009] print_address_description.constprop.0.cold+0xd3/0x413 [ 1533.951346][ T7009] ? vprintk_func+0x97/0x1a6 [ 1533.955944][ T7009] ? unhash_mnt+0x3a6/0x420 [ 1533.960446][ T7009] kasan_report.cold+0x1f/0x37 [ 1533.965221][ T7009] ? unhash_mnt+0x3a6/0x420 [ 1533.970076][ T7009] unhash_mnt+0x3a6/0x420 [ 1533.974581][ T7009] __detach_mounts+0xd7/0x290 [ 1533.979323][ T7009] vfs_rmdir+0x346/0x500 [ 1533.983569][ T7009] do_rmdir+0x371/0x3e0 [ 1533.987736][ T7009] ? __ia32_sys_mkdir+0x80/0x80 [ 1533.992656][ T7009] ? unlock_page_memcg+0x30/0x30 [ 1533.997707][ T7009] ? ___might_sleep+0x15a/0x2b0 [ 1534.002648][ T7009] ? task_work_run+0x160/0x1b0 [ 1534.007475][ T7009] ? trace_hardirqs_off_caller+0x55/0x230 [ 1534.013217][ T7009] do_syscall_64+0xf6/0x7d0 [ 1534.017764][ T7009] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1534.023851][ T7009] RIP: 0033:0x45c837 [ 1534.027744][ T7009] Code: 00 66 90 b8 57 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 54 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1534.048580][ T7009] RSP: 002b:00007ffc19e22108 EFLAGS: 00000207 ORIG_RAX: 0000000000000054 [ 1534.056995][ T7009] RAX: ffffffffffffffda RBX: 0000000000000065 RCX: 000000000045c837 [ 1534.064957][ T7009] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007ffc19e232a0 [ 1534.072929][ T7009] RBP: 0000000000001993 R08: 0000000000000000 R09: 0000000000000001 [ 1534.081003][ T7009] R10: 0000000000000005 R11: 0000000000000207 R12: 00007ffc19e232a0 [ 1534.089015][ T7009] R13: 0000000001da79c0 R14: 0000000000000000 R15: 00007ffc19e25420 [ 1534.097014][ T7009] [ 1534.099425][ T7009] Allocated by task 27214: [ 1534.103838][ T7009] save_stack+0x1b/0x40 [ 1534.107980][ T7009] __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 1534.113603][ T7009] kmem_cache_alloc+0x11b/0x740 [ 1534.118441][ T7009] alloc_vfsmnt+0x23/0x680 [ 1534.123021][ T7009] clone_mnt+0x6c/0xf50 [ 1534.127169][ T7009] copy_tree+0xfb/0x920 [ 1534.131318][ T7009] propagate_one+0x40e/0x760 [ 1534.135909][ T7009] propagate_mnt+0xfd/0x330 [ 1534.140412][ T7009] attach_recursive_mnt+0x83f/0xd30 [ 1534.145604][ T7009] graft_tree+0x199/0x220 [ 1534.149921][ T7009] do_mount+0x15a3/0x1b40 [ 1534.154260][ T7009] __x64_sys_mount+0x18f/0x230 [ 1534.159188][ T7009] do_syscall_64+0xf6/0x7d0 [ 1534.163687][ T7009] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1534.169559][ T7009] [ 1534.171880][ T7009] Freed by task 9: [ 1534.175591][ T7009] save_stack+0x1b/0x40 [ 1534.179737][ T7009] __kasan_slab_free+0xf7/0x140 [ 1534.184579][ T7009] kmem_cache_free+0x7f/0x320 [ 1534.189241][ T7009] rcu_core+0x59f/0x1370 [ 1534.193817][ T7009] __do_softirq+0x26c/0x9f7 [ 1534.198296][ T7009] [ 1534.200614][ T7009] The buggy address belongs to the object at ffff8880001101c0 [ 1534.200614][ T7009] which belongs to the cache mnt_cache of size 312 [ 1534.214500][ T7009] The buggy address is located 0 bytes inside of [ 1534.214500][ T7009] 312-byte region [ffff8880001101c0, ffff8880001102f8) [ 1534.227597][ T7009] The buggy address belongs to the page: [ 1534.233220][ T7009] page:ffffea0000004400 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 [ 1534.242310][ T7009] flags: 0x7ffe0000000200(slab) [ 1534.247161][ T7009] raw: 007ffe0000000200 ffffea000136c888 ffffea00013d88c8 ffff88821bc50c40 [ 1534.255734][ T7009] raw: 0000000000000000 ffff888000110040 000000010000000a 0000000000000000 [ 1534.264302][ T7009] page dumped because: kasan: bad access detected [ 1534.270694][ T7009] [ 1534.273021][ T7009] Memory state around the buggy address: [ 1534.278654][ T7009] ffff888000110080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1534.286701][ T7009] ffff888000110100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc [ 1534.294751][ T7009] >ffff888000110180: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 1534.302801][ T7009] ^ [ 1534.308949][ T7009] ffff888000110200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1534.317003][ T7009] ffff888000110280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc [ 1534.325076][ T7009] ================================================================== [ 1534.333134][ T7009] Disabling lock debugging due to kernel taint [ 1534.339697][ T7009] Kernel panic - not syncing: panic_on_warn set ... [ 1534.346282][ T7009] CPU: 0 PID: 7009 Comm: syz-executor.2 Tainted: G B 5.7.0-syzkaller #0 [ 1534.355902][ T7009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1534.365951][ T7009] Call Trace: [ 1534.369239][ T7009] dump_stack+0x188/0x20d [ 1534.373646][ T7009] ? unhash_mnt+0x360/0x420 [ 1534.378216][ T7009] panic+0x2e3/0x75c [ 1534.382106][ T7009] ? add_taint.cold+0x16/0x16 [ 1534.386790][ T7009] ? unhash_mnt+0x3a6/0x420 [ 1534.391382][ T7009] ? trace_hardirqs_on+0x55/0x220 [ 1534.396397][ T7009] ? unhash_mnt+0x3a6/0x420 [ 1534.400920][ T7009] ? unhash_mnt+0x3a6/0x420 [ 1534.405414][ T7009] end_report+0x4d/0x53 [ 1534.409582][ T7009] kasan_report.cold+0xd/0x37 [ 1534.414252][ T7009] ? unhash_mnt+0x3a6/0x420 [ 1534.418745][ T7009] unhash_mnt+0x3a6/0x420 [ 1534.423067][ T7009] __detach_mounts+0xd7/0x290 [ 1534.427765][ T7009] vfs_rmdir+0x346/0x500 [ 1534.432024][ T7009] do_rmdir+0x371/0x3e0 [ 1534.436431][ T7009] ? __ia32_sys_mkdir+0x80/0x80 [ 1534.441383][ T7009] ? unlock_page_memcg+0x30/0x30 [ 1534.446316][ T7009] ? ___might_sleep+0x15a/0x2b0 [ 1534.451159][ T7009] ? task_work_run+0x160/0x1b0 [ 1534.455906][ T7009] ? trace_hardirqs_off_caller+0x55/0x230 [ 1534.461623][ T7009] do_syscall_64+0xf6/0x7d0 [ 1534.466124][ T7009] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1534.472031][ T7009] RIP: 0033:0x45c837 [ 1534.475930][ T7009] Code: 00 66 90 b8 57 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 54 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1534.495514][ T7009] RSP: 002b:00007ffc19e22108 EFLAGS: 00000207 ORIG_RAX: 0000000000000054 [ 1534.503999][ T7009] RAX: ffffffffffffffda RBX: 0000000000000065 RCX: 000000000045c837 [ 1534.512069][ T7009] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007ffc19e232a0 [ 1534.520030][ T7009] RBP: 0000000000001993 R08: 0000000000000000 R09: 0000000000000001 [ 1534.528009][ T7009] R10: 0000000000000005 R11: 0000000000000207 R12: 00007ffc19e232a0 [ 1534.535965][ T7009] R13: 0000000001da79c0 R14: 0000000000000000 R15: 00007ffc19e25420 [ 1534.545542][ T7009] Kernel Offset: disabled [ 1534.549861][ T7009] Rebooting in 86400 seconds..