0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x3ffff}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:16:52 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xa200}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:16:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r2 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) recvmmsg(r2, &(0x7f00000046c0)=[{{&(0x7f00000000c0)=@isdn, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/5, 0x5}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f0000001880)=""/4096, 0x1000}], 0x5}, 0x3}, {{&(0x7f00000004c0)=@phonet, 0x80, &(0x7f0000000280)=[{&(0x7f0000000540)=""/223, 0xdf}, {&(0x7f0000000640)=""/119, 0x77}], 0x2, &(0x7f00000006c0)=""/5, 0x5}, 0x6}, {{&(0x7f0000000700)=@xdp, 0xfffffffffffffc82, &(0x7f0000002b40)=[{&(0x7f0000002880)=""/108, 0x6c}, {&(0x7f0000002900)=""/77, 0x4d}, {&(0x7f0000002980)=""/164, 0xa4}, {&(0x7f0000002a40)=""/242, 0xf2}], 0x4}, 0x6}, {{&(0x7f0000002b80)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000003f80)=[{&(0x7f0000002c00)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/241, 0xf1}, {&(0x7f0000003d00)=""/214, 0xd6}, {&(0x7f0000003e00)=""/44, 0x2c}, {&(0x7f0000003e40)=""/158, 0x9e}, {&(0x7f0000003f00)=""/79, 0x4f}], 0x6}, 0x2}, {{&(0x7f0000004000)=@caif=@dgm, 0x80, &(0x7f0000004580)=[{&(0x7f0000004080)=""/191, 0xbf}, {&(0x7f0000004140)=""/121, 0x79}, {&(0x7f0000004d40)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/99, 0x63}, {&(0x7f0000004240)=""/48, 0x30}, {&(0x7f0000004280)=""/77, 0x4d}, {&(0x7f0000004300)=""/152, 0x98}, {&(0x7f00000043c0)=""/211, 0xd3}, {&(0x7f00000044c0)=""/155, 0x9b}, {&(0x7f0000005d40)=""/4096, 0x1000}], 0xa, &(0x7f0000004640)=""/107, 0x6b}, 0x101}], 0x5, 0x1, &(0x7f0000004800)={0x77359400}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:16:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f0000004d00), 0x0, 0x0, 0x0) 01:16:52 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x40000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:16:52 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xae02}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:16:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f0000004d00), 0x0, 0x0, 0x0) 01:16:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r2 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) recvmmsg(r2, &(0x7f00000046c0)=[{{&(0x7f00000000c0)=@isdn, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/5, 0x5}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f0000001880)=""/4096, 0x1000}], 0x5}, 0x3}, {{&(0x7f00000004c0)=@phonet, 0x80, &(0x7f0000000280)=[{&(0x7f0000000540)=""/223, 0xdf}, {&(0x7f0000000640)=""/119, 0x77}], 0x2, &(0x7f00000006c0)=""/5, 0x5}, 0x6}, {{&(0x7f0000000700)=@xdp, 0xfffffffffffffc82, &(0x7f0000002b40)=[{&(0x7f0000002880)=""/108, 0x6c}, {&(0x7f0000002900)=""/77, 0x4d}, {&(0x7f0000002980)=""/164, 0xa4}, {&(0x7f0000002a40)=""/242, 0xf2}], 0x4}, 0x6}, {{&(0x7f0000002b80)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000003f80)=[{&(0x7f0000002c00)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/241, 0xf1}, {&(0x7f0000003d00)=""/214, 0xd6}, {&(0x7f0000003e00)=""/44, 0x2c}, {&(0x7f0000003e40)=""/158, 0x9e}, {&(0x7f0000003f00)=""/79, 0x4f}], 0x6}, 0x2}, {{&(0x7f0000004000)=@caif=@dgm, 0x80, &(0x7f0000004580)=[{&(0x7f0000004080)=""/191, 0xbf}, {&(0x7f0000004140)=""/121, 0x79}, {&(0x7f0000004d40)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/99, 0x63}, {&(0x7f0000004240)=""/48, 0x30}, {&(0x7f0000004280)=""/77, 0x4d}, {&(0x7f0000004300)=""/152, 0x98}, {&(0x7f00000043c0)=""/211, 0xd3}, {&(0x7f00000044c0)=""/155, 0x9b}, {&(0x7f0000005d40)=""/4096, 0x1000}], 0xa, &(0x7f0000004640)=""/107, 0x6b}, 0x101}], 0x5, 0x1, &(0x7f0000004800)={0x77359400}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:16:53 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xb201}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:16:53 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="b4000000000b00007910000000000000c310000aa1000000950074000000000031fb0d3a42319fa204399d17d34e075fdcda533ab1aa71ab1d764152e6cb25dadc7ded5d05000000adea9fca11027d29066927603deb92de3141e8ed7ac5b8902070213cdfdc5d6c4890cdeb50347c2f060581172b94c6ba22a2b58eb6cbad46ed6e7965a2ba103b0b36f790bb41931f9a3d4dd127c1b4e49f7468f5e603950c4f67581c92ef8a7e8ece0000b9528454a057b5e6760808e8baf4c29861676e03bab49d5beadea592c048959303dfd62c46eac29e990747b62b9ea11385d59e5f60131dad5e782991cc922cfb97983a839d16b986ce8a939705aaf5a9443214f515c6026d0655d9efa6f49d6d9c8b6a59e34265019c90dbb4ef7c8fe90155436b571116d3b4bfc2d71b7a2a966a628549b1b8c46986d9ba8e0ace933a95"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:16:54 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:16:54 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x100000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:16:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f0000004d00), 0x0, 0x0, 0x0) 01:16:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r2 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) recvmmsg(r2, &(0x7f00000046c0)=[{{&(0x7f00000000c0)=@isdn, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/5, 0x5}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f0000001880)=""/4096, 0x1000}], 0x5}, 0x3}, {{&(0x7f00000004c0)=@phonet, 0x80, &(0x7f0000000280)=[{&(0x7f0000000540)=""/223, 0xdf}, {&(0x7f0000000640)=""/119, 0x77}], 0x2, &(0x7f00000006c0)=""/5, 0x5}, 0x6}, {{&(0x7f0000000700)=@xdp, 0xfffffffffffffc82, &(0x7f0000002b40)=[{&(0x7f0000002880)=""/108, 0x6c}, {&(0x7f0000002900)=""/77, 0x4d}, {&(0x7f0000002980)=""/164, 0xa4}, {&(0x7f0000002a40)=""/242, 0xf2}], 0x4}, 0x6}, {{&(0x7f0000002b80)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000003f80)=[{&(0x7f0000002c00)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/241, 0xf1}, {&(0x7f0000003d00)=""/214, 0xd6}, {&(0x7f0000003e00)=""/44, 0x2c}, {&(0x7f0000003e40)=""/158, 0x9e}, {&(0x7f0000003f00)=""/79, 0x4f}], 0x6}, 0x2}, {{&(0x7f0000004000)=@caif=@dgm, 0x80, &(0x7f0000004580)=[{&(0x7f0000004080)=""/191, 0xbf}, {&(0x7f0000004140)=""/121, 0x79}, {&(0x7f0000004d40)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/99, 0x63}, {&(0x7f0000004240)=""/48, 0x30}, {&(0x7f0000004280)=""/77, 0x4d}, {&(0x7f0000004300)=""/152, 0x98}, {&(0x7f00000043c0)=""/211, 0xd3}, {&(0x7f00000044c0)=""/155, 0x9b}, {&(0x7f0000005d40)=""/4096, 0x1000}], 0xa, &(0x7f0000004640)=""/107, 0x6b}, 0x101}], 0x5, 0x1, &(0x7f0000004800)={0x77359400}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:16:54 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xb601}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:16:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=""/233, 0xe9}}], 0x1, 0x0, 0x0) 01:16:54 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x200000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:16:54 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xb816}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:16:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r2 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) recvmmsg(r2, &(0x7f00000046c0)=[{{&(0x7f00000000c0)=@isdn, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/5, 0x5}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f0000001880)=""/4096, 0x1000}], 0x5}, 0x3}, {{&(0x7f00000004c0)=@phonet, 0x80, &(0x7f0000000280)=[{&(0x7f0000000540)=""/223, 0xdf}, {&(0x7f0000000640)=""/119, 0x77}], 0x2, &(0x7f00000006c0)=""/5, 0x5}, 0x6}, {{&(0x7f0000000700)=@xdp, 0xfffffffffffffc82, &(0x7f0000002b40)=[{&(0x7f0000002880)=""/108, 0x6c}, {&(0x7f0000002900)=""/77, 0x4d}, {&(0x7f0000002980)=""/164, 0xa4}, {&(0x7f0000002a40)=""/242, 0xf2}], 0x4}, 0x6}, {{&(0x7f0000002b80)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000003f80)=[{&(0x7f0000002c00)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/241, 0xf1}, {&(0x7f0000003d00)=""/214, 0xd6}, {&(0x7f0000003e00)=""/44, 0x2c}, {&(0x7f0000003e40)=""/158, 0x9e}, {&(0x7f0000003f00)=""/79, 0x4f}], 0x6}, 0x2}, {{&(0x7f0000004000)=@caif=@dgm, 0x80, &(0x7f0000004580)=[{&(0x7f0000004080)=""/191, 0xbf}, {&(0x7f0000004140)=""/121, 0x79}, {&(0x7f0000004d40)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/99, 0x63}, {&(0x7f0000004240)=""/48, 0x30}, {&(0x7f0000004280)=""/77, 0x4d}, {&(0x7f0000004300)=""/152, 0x98}, {&(0x7f00000043c0)=""/211, 0xd3}, {&(0x7f00000044c0)=""/155, 0x9b}, {&(0x7f0000005d40)=""/4096, 0x1000}], 0xa, &(0x7f0000004640)=""/107, 0x6b}, 0x101}], 0x5, 0x1, &(0x7f0000004800)={0x77359400}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:16:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=""/233, 0xe9}}], 0x1, 0x0, 0x0) 01:16:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="18020000f2ffffff0000000000000000850000002c00000095000000000000003d789ade838a5ad00c21f97a9d6f55528c474cb385573d9f5ec0798d497a5d0ab93dbb637fd8de14970b4f76b599913ff77098a8cd276dee070239f048bff4c9d61b5c334ef7384130fd875789e46307b8f29c46149360bea59a42011aabb3125f93a06d27b6cf4f033c6000c3ab63ee03e9e7023574b86ce473bc8964c32f955d410083f7567775a2ca15dbbf01550310a78644e801f1753107cee250cb376879ae14b9e1ab98703bc7db41925c55b0a4141ae3c08d264831d0f6365469c356218500000000000000000000000000000000000000000000001a18f6de00bb8c95f8bdc2a54e6aefee88e5b1f6fdbc3a483235918073d11474cfa5d71d92c9bd2b72c3ce63d47075ae7c59d82cea1243db36970e2f56ae270cb56281877934e999394a7dfe2bb6a29394c82bfdffaedc4df6f74e8f286454fca6300d100e7eb8717c8528e445fbefe6a3139191529f22e4c0435e5c53e469f70c08bdff633307bbf119ffdb2e1d717eb268eea7322da5fda4fc19af52289d000f2dd88dda869c8a84dbc54c10bc7fee0486fa294b41c1d4dc44a9801c34ad96bbd834c7dd71160dfaf15a150d0a0b01a6168858b5d085a8b3ca5c3bd8534edc32c0bd1fdd112a1dc6f708cbe1a9432887e17fa9e6f63c1d86f6cec7b362ae4fe101db6870f021269a23a10d6f1301c86b2319d220cf568a6289c751e0c0098d57ff070615e9f21e6e71b281c016d42413122b787041d4b77e3bbabd945fd44eab70d205764e8a61420b"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r3 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) recvmmsg(r3, &(0x7f00000046c0)=[{{&(0x7f00000000c0)=@isdn, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/5, 0x5}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f0000001880)=""/4096, 0x1000}], 0x5}, 0x3}, {{&(0x7f00000004c0)=@phonet, 0x80, &(0x7f0000000280)=[{&(0x7f0000000540)=""/223, 0xdf}, {&(0x7f0000000640)=""/119, 0x77}], 0x2, &(0x7f00000006c0)=""/5, 0x5}, 0x6}, {{&(0x7f0000000700)=@xdp, 0xfffffffffffffc82, &(0x7f0000002b40)=[{&(0x7f0000002880)=""/108, 0x6c}, {&(0x7f0000002900)=""/77, 0x4d}, {&(0x7f0000002980)=""/164, 0xa4}, {&(0x7f0000002a40)=""/242, 0xf2}], 0x4}, 0x6}, {{&(0x7f0000002b80)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000003f80)=[{&(0x7f0000002c00)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/241, 0xf1}, {&(0x7f0000003d00)=""/214, 0xd6}, {&(0x7f0000003e00)=""/44, 0x2c}, {&(0x7f0000003e40)=""/158, 0x9e}, {&(0x7f0000003f00)=""/79, 0x4f}], 0x6}, 0x2}, {{&(0x7f0000004000)=@caif=@dgm, 0x80, &(0x7f0000004580)=[{&(0x7f0000004080)=""/191, 0xbf}, {&(0x7f0000004140)=""/121, 0x79}, {&(0x7f0000004d40)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/99, 0x63}, {&(0x7f0000004240)=""/48, 0x30}, {&(0x7f0000004280)=""/77, 0x4d}, {&(0x7f0000004300)=""/152, 0x98}, {&(0x7f00000043c0)=""/211, 0xd3}, {&(0x7f00000044c0)=""/155, 0x9b}, {&(0x7f0000005d40)=""/4096, 0x1000}], 0xa, &(0x7f0000004640)=""/107, 0x6b}, 0x101}], 0x5, 0x1, &(0x7f0000004800)={0x77359400}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r4, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r5, 0x0, 0x0) 01:16:54 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:16:55 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:16:55 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xb929}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:16:55 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x200100}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:16:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 01:16:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r3 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) recvmmsg(r3, &(0x7f00000046c0)=[{{&(0x7f00000000c0)=@isdn, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/5, 0x5}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f0000001880)=""/4096, 0x1000}], 0x5}, 0x3}, {{&(0x7f00000004c0)=@phonet, 0x80, &(0x7f0000000280)=[{&(0x7f0000000540)=""/223, 0xdf}, {&(0x7f0000000640)=""/119, 0x77}], 0x2, &(0x7f00000006c0)=""/5, 0x5}, 0x6}, {{&(0x7f0000000700)=@xdp, 0xfffffffffffffc82, &(0x7f0000002b40)=[{&(0x7f0000002880)=""/108, 0x6c}, {&(0x7f0000002900)=""/77, 0x4d}, {&(0x7f0000002980)=""/164, 0xa4}, {&(0x7f0000002a40)=""/242, 0xf2}], 0x4}, 0x6}, {{&(0x7f0000002b80)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000003f80)=[{&(0x7f0000002c00)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/241, 0xf1}, {&(0x7f0000003d00)=""/214, 0xd6}, {&(0x7f0000003e00)=""/44, 0x2c}, {&(0x7f0000003e40)=""/158, 0x9e}, {&(0x7f0000003f00)=""/79, 0x4f}], 0x6}, 0x2}, {{&(0x7f0000004000)=@caif=@dgm, 0x80, &(0x7f0000004580)=[{&(0x7f0000004080)=""/191, 0xbf}, {&(0x7f0000004140)=""/121, 0x79}, {&(0x7f0000004d40)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/99, 0x63}, {&(0x7f0000004240)=""/48, 0x30}, {&(0x7f0000004280)=""/77, 0x4d}, {&(0x7f0000004300)=""/152, 0x98}, {&(0x7f00000043c0)=""/211, 0xd3}, {&(0x7f00000044c0)=""/155, 0x9b}, {&(0x7f0000005d40)=""/4096, 0x1000}], 0xa, &(0x7f0000004640)=""/107, 0x6b}, 0x101}], 0x5, 0x1, &(0x7f0000004800)={0x77359400}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r4, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r5, 0x0, 0x0) [ 1957.174848][ T8541] __bpf_mt_check_bytecode: 30 callbacks suppressed [ 1957.174975][ T8541] xt_bpf: check failed: parse error [ 1957.211593][ T8547] xt_bpf: check failed: parse error 01:16:55 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x0, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) [ 1957.234928][ T8546] xt_bpf: check failed: parse error 01:16:55 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xba01}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:16:55 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="b4000000000b00007910000000000000c310000aa1000000950074000000000031fb0d3a42319fa204399d17d34e075fdcda533ab1aa71ab1d764152e6cb25dadc7ded5d05000000adea9fca11027d29066927603deb92de3141e8ed7ac5b8902070213cdfdc5d6c4890cdeb50347c2f060581172b94c6ba22a2b58eb6cbad46ed6e7965a2ba103b0b36f790bb41931f9a3d4dd127c1b4e49f7468f5e603950c4f67581c92ef8a7e8ece0000b9528454a057b5e6760808e8baf4c29861676e03bab49d5beadea592c048959303dfd62c46eac29e990747b62b9ea11385d59e5f60131dad5e782991cc922cfb97983a839d16b986ce8a939705aaf5a9443214f515c6026d0655d9efa6f49d6d9c8b6a59e34265019c90dbb4ef7c8fe90155436b571116d3b4bfc2d71b7a2a966a628549b1b8c46986d9ba8e0ace933a95"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:16:55 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x1000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:16:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r3 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) recvmmsg(r3, &(0x7f00000046c0)=[{{&(0x7f00000000c0)=@isdn, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/5, 0x5}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f0000001880)=""/4096, 0x1000}], 0x5}, 0x3}, {{&(0x7f00000004c0)=@phonet, 0x80, &(0x7f0000000280)=[{&(0x7f0000000540)=""/223, 0xdf}, {&(0x7f0000000640)=""/119, 0x77}], 0x2, &(0x7f00000006c0)=""/5, 0x5}, 0x6}, {{&(0x7f0000000700)=@xdp, 0xfffffffffffffc82, &(0x7f0000002b40)=[{&(0x7f0000002880)=""/108, 0x6c}, {&(0x7f0000002900)=""/77, 0x4d}, {&(0x7f0000002980)=""/164, 0xa4}, {&(0x7f0000002a40)=""/242, 0xf2}], 0x4}, 0x6}, {{&(0x7f0000002b80)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000003f80)=[{&(0x7f0000002c00)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/241, 0xf1}, {&(0x7f0000003d00)=""/214, 0xd6}, {&(0x7f0000003e00)=""/44, 0x2c}, {&(0x7f0000003e40)=""/158, 0x9e}, {&(0x7f0000003f00)=""/79, 0x4f}], 0x6}, 0x2}, {{&(0x7f0000004000)=@caif=@dgm, 0x80, &(0x7f0000004580)=[{&(0x7f0000004080)=""/191, 0xbf}, {&(0x7f0000004140)=""/121, 0x79}, {&(0x7f0000004d40)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/99, 0x63}, {&(0x7f0000004240)=""/48, 0x30}, {&(0x7f0000004280)=""/77, 0x4d}, {&(0x7f0000004300)=""/152, 0x98}, {&(0x7f00000043c0)=""/211, 0xd3}, {&(0x7f00000044c0)=""/155, 0x9b}, {&(0x7f0000005d40)=""/4096, 0x1000}], 0xa, &(0x7f0000004640)=""/107, 0x6b}, 0x101}], 0x5, 0x1, &(0x7f0000004800)={0x77359400}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r4, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r5, 0x0, 0x0) [ 1957.353089][ T8552] xt_bpf: check failed: parse error 01:16:55 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xba03}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) [ 1957.417087][ T8555] xt_bpf: check failed: parse error 01:16:55 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x2000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) [ 1957.517755][ T8558] xt_bpf: check failed: parse error [ 1957.540723][ T8560] xt_bpf: check failed: parse error [ 1957.599212][ T8561] xt_bpf: check failed: parse error [ 1957.603248][ T8564] xt_bpf: check failed: parse error [ 1957.860468][ T8569] xt_bpf: check failed: parse error 01:16:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r3 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) recvmmsg(r3, &(0x7f00000046c0)=[{{&(0x7f00000000c0)=@isdn, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/5, 0x5}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f0000001880)=""/4096, 0x1000}], 0x5}, 0x3}, {{&(0x7f00000004c0)=@phonet, 0x80, &(0x7f0000000280)=[{&(0x7f0000000540)=""/223, 0xdf}, {&(0x7f0000000640)=""/119, 0x77}], 0x2, &(0x7f00000006c0)=""/5, 0x5}, 0x6}, {{&(0x7f0000000700)=@xdp, 0xfffffffffffffc82, &(0x7f0000002b40)=[{&(0x7f0000002880)=""/108, 0x6c}, {&(0x7f0000002900)=""/77, 0x4d}, {&(0x7f0000002980)=""/164, 0xa4}, {&(0x7f0000002a40)=""/242, 0xf2}], 0x4}, 0x6}, {{&(0x7f0000002b80)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000003f80)=[{&(0x7f0000002c00)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/241, 0xf1}, {&(0x7f0000003d00)=""/214, 0xd6}, {&(0x7f0000003e00)=""/44, 0x2c}, {&(0x7f0000003e40)=""/158, 0x9e}, {&(0x7f0000003f00)=""/79, 0x4f}], 0x6}, 0x2}, {{&(0x7f0000004000)=@caif=@dgm, 0x80, &(0x7f0000004580)=[{&(0x7f0000004080)=""/191, 0xbf}, {&(0x7f0000004140)=""/121, 0x79}, {&(0x7f0000004d40)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/99, 0x63}, {&(0x7f0000004240)=""/48, 0x30}, {&(0x7f0000004280)=""/77, 0x4d}, {&(0x7f0000004300)=""/152, 0x98}, {&(0x7f00000043c0)=""/211, 0xd3}, {&(0x7f00000044c0)=""/155, 0x9b}, {&(0x7f0000005d40)=""/4096, 0x1000}], 0xa, &(0x7f0000004640)=""/107, 0x6b}, 0x101}], 0x5, 0x1, &(0x7f0000004800)={0x77359400}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r4, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r5, 0x0, 0x0) 01:16:56 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xc001}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:16:56 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:16:56 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="b4000000000b00007910000000000000c310000aa1000000950074000000000031fb0d3a42319fa204399d17d34e075fdcda533ab1aa71ab1d764152e6cb25dadc7ded5d05000000adea9fca11027d29066927603deb92de3141e8ed7ac5b8902070213cdfdc5d6c4890cdeb50347c2f060581172b94c6ba22a2b58eb6cbad46ed6e7965a2ba103b0b36f790bb41931f9a3d4dd127c1b4e49f7468f5e603950c4f67581c92ef8a7e8ece0000b9528454a057b5e6760808e8baf4c29861676e03bab49d5beadea592c048959303dfd62c46eac29e990747b62b9ea11385d59e5f60131dad5e782991cc922cfb97983a839d16b986ce8a939705aaf5a9443214f515c6026d0655d9efa6f49d6d9c8b6a59e34265019c90dbb4ef7c8fe90155436b571116d3b4bfc2d71b7a2a966a628549b1b8c46986d9ba8e0ace933a95"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:16:56 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x2030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:16:57 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="b4000000000b00007910000000000000c310000aa1000000950074000000000031fb0d3a42319fa204399d17d34e075fdcda533ab1aa71ab1d764152e6cb25dadc7ded5d05000000adea9fca11027d29066927603deb92de3141e8ed7ac5b8902070213cdfdc5d6c4890cdeb50347c2f060581172b94c6ba22a2b58eb6cbad46ed6e7965a2ba103b0b36f790bb41931f9a3d4dd127c1b4e49f7468f5e603950c4f67581c92ef8a7e8ece0000b9528454a057b5e6760808e8baf4c29861676e03bab49d5beadea592c048959303dfd62c46eac29e990747b62b9ea11385d59e5f60131dad5e782991cc922cfb97983a839d16b986ce8a939705aaf5a9443214f515c6026d0655d9efa6f49d6d9c8b6a59e34265019c90dbb4ef7c8fe90155436b571116d3b4bfc2d71b7a2a966a628549b1b8c46986d9ba8e0ace933a95"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:16:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r3 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) recvmmsg(r3, &(0x7f00000046c0)=[{{&(0x7f00000000c0)=@isdn, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/5, 0x5}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f0000001880)=""/4096, 0x1000}], 0x5}, 0x3}, {{&(0x7f00000004c0)=@phonet, 0x80, &(0x7f0000000280)=[{&(0x7f0000000540)=""/223, 0xdf}, {&(0x7f0000000640)=""/119, 0x77}], 0x2, &(0x7f00000006c0)=""/5, 0x5}, 0x6}, {{&(0x7f0000000700)=@xdp, 0xfffffffffffffc82, &(0x7f0000002b40)=[{&(0x7f0000002880)=""/108, 0x6c}, {&(0x7f0000002900)=""/77, 0x4d}, {&(0x7f0000002980)=""/164, 0xa4}, {&(0x7f0000002a40)=""/242, 0xf2}], 0x4}, 0x6}, {{&(0x7f0000002b80)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000003f80)=[{&(0x7f0000002c00)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/241, 0xf1}, {&(0x7f0000003d00)=""/214, 0xd6}, {&(0x7f0000003e00)=""/44, 0x2c}, {&(0x7f0000003e40)=""/158, 0x9e}, {&(0x7f0000003f00)=""/79, 0x4f}], 0x6}, 0x2}, {{&(0x7f0000004000)=@caif=@dgm, 0x80, &(0x7f0000004580)=[{&(0x7f0000004080)=""/191, 0xbf}, {&(0x7f0000004140)=""/121, 0x79}, {&(0x7f0000004d40)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/99, 0x63}, {&(0x7f0000004240)=""/48, 0x30}, {&(0x7f0000004280)=""/77, 0x4d}, {&(0x7f0000004300)=""/152, 0x98}, {&(0x7f00000043c0)=""/211, 0xd3}, {&(0x7f00000044c0)=""/155, 0x9b}, {&(0x7f0000005d40)=""/4096, 0x1000}], 0xa, &(0x7f0000004640)=""/107, 0x6b}, 0x101}], 0x5, 0x1, &(0x7f0000004800)={0x77359400}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r4, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r5, 0x0, 0x0) 01:16:57 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x3000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:16:57 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xc002}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:16:57 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x4000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:16:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r3 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) recvmmsg(r3, &(0x7f00000046c0)=[{{&(0x7f00000000c0)=@isdn, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/5, 0x5}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f0000001880)=""/4096, 0x1000}], 0x5}, 0x3}, {{&(0x7f00000004c0)=@phonet, 0x80, &(0x7f0000000280)=[{&(0x7f0000000540)=""/223, 0xdf}, {&(0x7f0000000640)=""/119, 0x77}], 0x2, &(0x7f00000006c0)=""/5, 0x5}, 0x6}, {{&(0x7f0000000700)=@xdp, 0xfffffffffffffc82, &(0x7f0000002b40)=[{&(0x7f0000002880)=""/108, 0x6c}, {&(0x7f0000002900)=""/77, 0x4d}, {&(0x7f0000002980)=""/164, 0xa4}, {&(0x7f0000002a40)=""/242, 0xf2}], 0x4}, 0x6}, {{&(0x7f0000002b80)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000003f80)=[{&(0x7f0000002c00)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/241, 0xf1}, {&(0x7f0000003d00)=""/214, 0xd6}, {&(0x7f0000003e00)=""/44, 0x2c}, {&(0x7f0000003e40)=""/158, 0x9e}, {&(0x7f0000003f00)=""/79, 0x4f}], 0x6}, 0x2}, {{&(0x7f0000004000)=@caif=@dgm, 0x80, &(0x7f0000004580)=[{&(0x7f0000004080)=""/191, 0xbf}, {&(0x7f0000004140)=""/121, 0x79}, {&(0x7f0000004d40)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/99, 0x63}, {&(0x7f0000004240)=""/48, 0x30}, {&(0x7f0000004280)=""/77, 0x4d}, {&(0x7f0000004300)=""/152, 0x98}, {&(0x7f00000043c0)=""/211, 0xd3}, {&(0x7f00000044c0)=""/155, 0x9b}, {&(0x7f0000005d40)=""/4096, 0x1000}], 0xa, &(0x7f0000004640)=""/107, 0x6b}, 0x101}], 0x5, 0x1, &(0x7f0000004800)={0x77359400}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r4, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r5, 0x0, 0x0) 01:16:57 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xc003}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:16:58 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:16:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r3 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(r3, &(0x7f00000046c0)=[{{&(0x7f00000000c0)=@isdn, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/5, 0x5}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f0000001880)=""/4096, 0x1000}], 0x5}, 0x3}, {{&(0x7f00000004c0)=@phonet, 0x80, &(0x7f0000000280)=[{&(0x7f0000000540)=""/223, 0xdf}, {&(0x7f0000000640)=""/119, 0x77}], 0x2, &(0x7f00000006c0)=""/5, 0x5}, 0x6}, {{&(0x7f0000000700)=@xdp, 0xfffffffffffffc82, &(0x7f0000002b40)=[{&(0x7f0000002880)=""/108, 0x6c}, {&(0x7f0000002900)=""/77, 0x4d}, {&(0x7f0000002980)=""/164, 0xa4}, {&(0x7f0000002a40)=""/242, 0xf2}], 0x4}, 0x6}, {{&(0x7f0000002b80)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000003f80)=[{&(0x7f0000002c00)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/241, 0xf1}, {&(0x7f0000003d00)=""/214, 0xd6}, {&(0x7f0000003e00)=""/44, 0x2c}, {&(0x7f0000003e40)=""/158, 0x9e}, {&(0x7f0000003f00)=""/79, 0x4f}], 0x6}, 0x2}, {{&(0x7f0000004000)=@caif=@dgm, 0x80, &(0x7f0000004580)=[{&(0x7f0000004080)=""/191, 0xbf}, {&(0x7f0000004140)=""/121, 0x79}, {&(0x7f0000004d40)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/99, 0x63}, {&(0x7f0000004240)=""/48, 0x30}, {&(0x7f0000004280)=""/77, 0x4d}, {&(0x7f0000004300)=""/152, 0x98}, {&(0x7f00000043c0)=""/211, 0xd3}, {&(0x7f00000044c0)=""/155, 0x9b}, {&(0x7f0000005d40)=""/4096, 0x1000}], 0xa, &(0x7f0000004640)=""/107, 0x6b}, 0x101}], 0x5, 0x1, &(0x7f0000004800)={0x77359400}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r4, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r5, 0x0, 0x0) 01:16:58 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x5000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:16:58 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xc202}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:16:58 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x7, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:16:58 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:16:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000046c0)=[{{&(0x7f00000000c0)=@isdn, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/5, 0x5}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f0000001880)=""/4096, 0x1000}], 0x5}, 0x3}, {{&(0x7f00000004c0)=@phonet, 0x80, &(0x7f0000000280)=[{&(0x7f0000000540)=""/223, 0xdf}, {&(0x7f0000000640)=""/119, 0x77}], 0x2, &(0x7f00000006c0)=""/5, 0x5}, 0x6}, {{&(0x7f0000000700)=@xdp, 0xfffffffffffffc82, &(0x7f0000002b40)=[{&(0x7f0000002880)=""/108, 0x6c}, {&(0x7f0000002900)=""/77, 0x4d}, {&(0x7f0000002980)=""/164, 0xa4}, {&(0x7f0000002a40)=""/242, 0xf2}], 0x4}, 0x6}, {{&(0x7f0000002b80)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000003f80)=[{&(0x7f0000002c00)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/241, 0xf1}, {&(0x7f0000003d00)=""/214, 0xd6}, {&(0x7f0000003e00)=""/44, 0x2c}, {&(0x7f0000003e40)=""/158, 0x9e}, {&(0x7f0000003f00)=""/79, 0x4f}], 0x6}, 0x2}, {{&(0x7f0000004000)=@caif=@dgm, 0x80, &(0x7f0000004580)=[{&(0x7f0000004080)=""/191, 0xbf}, {&(0x7f0000004140)=""/121, 0x79}, {&(0x7f0000004d40)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/99, 0x63}, {&(0x7f0000004240)=""/48, 0x30}, {&(0x7f0000004280)=""/77, 0x4d}, {&(0x7f0000004300)=""/152, 0x98}, {&(0x7f00000043c0)=""/211, 0xd3}, {&(0x7f00000044c0)=""/155, 0x9b}, {&(0x7f0000005d40)=""/4096, 0x1000}], 0xa, &(0x7f0000004640)=""/107, 0x6b}, 0x101}], 0x5, 0x1, &(0x7f0000004800)={0x77359400}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:16:58 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x6000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:16:58 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xc203}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:16:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x1, &(0x7f0000004800)={0x77359400}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:16:58 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x7000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:16:58 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xc803}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:16:59 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:16:59 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xca01}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:16:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="18020000f2ffffff0000000000000000850000002c00000095000000000000003d789ade838a5ad00c21f97a9d6f55528c474cb385573d9f5ec0798d497a5d0ab93dbb637fd8de14970b4f76b599913ff77098a8cd276dee070239f048bff4c9d61b5c334ef7384130fd875789e46307b8f29c46149360bea59a42011aabb3125f93a06d27b6cf4f033c6000c3ab63ee03e9e7023574b86ce473bc8964c32f955d410083f7567775a2ca15dbbf01550310a78644e801f1753107cee250cb376879ae14b9e1ab98703bc7db41925c55b0a4141ae3c08d264831d0f6365469c356218500000000000000000000000000000000000000000000001a18f6de00bb8c95f8bdc2a54e6aefee88e5b1f6fdbc3a483235918073d11474cfa5d71d92c9bd2b72c3ce63d47075ae7c59d82cea1243db36970e2f56ae270cb56281877934e999394a7dfe2bb6a29394c82bfdffaedc4df6f74e8f286454fca6300d100e7eb8717c8528e445fbefe6a3139191529f22e4c0435e5c53e469f70c08bdff633307bbf119ffdb2e1d717eb268eea7322da5fda4fc19af52289d000f2dd88dda869c8a84dbc54c10bc7fee0486fa294b41c1d4dc44a9801c34ad96bbd834c7dd71160dfaf15a150d0a0b01a6168858b5d085a8b3ca5c3bd8534edc32c0bd1fdd112a1dc6f708cbe1a9432887e17fa9e6f63c1d86f6cec7b362ae4fe101db6870f021269a23a10d6f1301c86b2319d220cf568a6289c751e0c0098d57ff070615e9f21e6e71b281c016d42413122b787041d4b77e3bbabd945fd44eab70d205764e8a61420b"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000004800)={0x77359400}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:16:59 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x8000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:16:59 executing program 4: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xc803}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:16:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:16:59 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:16:59 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x8030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:16:59 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:16:59 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xca03}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:16:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="18020000f2ffffff0000000000000000850000002c00000095000000000000003d789ade838a5ad00c21f97a9d6f55528c474cb385573d9f5ec0798d497a5d0ab93dbb637fd8de14970b4f76b599913ff77098a8cd276dee070239f048bff4c9d61b5c334ef7384130fd875789e46307b8f29c46149360bea59a42011aabb3125f93a06d27b6cf4f033c6000c3ab63ee03e9e7023574b86ce473bc8964c32f955d410083f7567775a2ca15dbbf01550310a78644e801f1753107cee250cb376879ae14b9e1ab98703bc7db41925c55b0a4141ae3c08d264831d0f6365469c356218500000000000000000000000000000000000000000000001a18f6de00bb8c95f8bdc2a54e6aefee88e5b1f6fdbc3a483235918073d11474cfa5d71d92c9bd2b72c3ce63d47075ae7c59d82cea1243db36970e2f56ae270cb56281877934e999394a7dfe2bb6a29394c82bfdffaedc4df6f74e8f286454fca6300d100e7eb8717c8528e445fbefe6a3139191529f22e4c0435e5c53e469f70c08bdff633307bbf119ffdb2e1d717eb268eea7322da5fda4fc19af52289d000f2dd88dda869c8a84dbc54c10bc7fee0486fa294b41c1d4dc44a9801c34ad96bbd834c7dd71160dfaf15a150d0a0b01a6168858b5d085a8b3ca5c3bd8534edc32c0bd1fdd112a1dc6f708cbe1a9432887e17fa9e6f63c1d86f6cec7b362ae4fe101db6870f021269a23a10d6f1301c86b2319d220cf568a6289c751e0c0098d57ff070615e9f21e6e71b281c016d42413122b787041d4b77e3bbabd945fd44eab70d205764e8a61420b"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:16:59 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xd000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:00 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:00 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xa020000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="18020000f2ffffff0000000000000000850000002c00000095000000000000003d789ade838a5ad00c21f97a9d6f55528c474cb385573d9f5ec0798d497a5d0ab93dbb637fd8de14970b4f76b599913ff77098a8cd276dee070239f048bff4c9d61b5c334ef7384130fd875789e46307b8f29c46149360bea59a42011aabb3125f93a06d27b6cf4f033c6000c3ab63ee03e9e7023574b86ce473bc8964c32f955d410083f7567775a2ca15dbbf01550310a78644e801f1753107cee250cb376879ae14b9e1ab98703bc7db41925c55b0a4141ae3c08d264831d0f6365469c356218500000000000000000000000000000000000000000000001a18f6de00bb8c95f8bdc2a54e6aefee88e5b1f6fdbc3a483235918073d11474cfa5d71d92c9bd2b72c3ce63d47075ae7c59d82cea1243db36970e2f56ae270cb56281877934e999394a7dfe2bb6a29394c82bfdffaedc4df6f74e8f286454fca6300d100e7eb8717c8528e445fbefe6a3139191529f22e4c0435e5c53e469f70c08bdff633307bbf119ffdb2e1d717eb268eea7322da5fda4fc19af52289d000f2dd88dda869c8a84dbc54c10bc7fee0486fa294b41c1d4dc44a9801c34ad96bbd834c7dd71160dfaf15a150d0a0b01a6168858b5d085a8b3ca5c3bd8534edc32c0bd1fdd112a1dc6f708cbe1a9432887e17fa9e6f63c1d86f6cec7b362ae4fe101db6870f021269a23a10d6f1301c86b2319d220cf568a6289c751e0c0098d57ff070615e9f21e6e71b281c016d42413122b787041d4b77e3bbabd945fd44eab70d205764e8a61420b"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:17:00 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xd203}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:00 executing program 4: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x1f00}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:17:01 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) [ 1962.609809][ T8668] __bpf_mt_check_bytecode: 30 callbacks suppressed [ 1962.609831][ T8668] xt_bpf: check failed: parse error [ 1962.631450][ T8669] xt_bpf: check failed: parse error 01:17:01 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xd802}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:17:01 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xa030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) [ 1962.786177][ T8676] xt_bpf: check failed: parse error [ 1962.821613][ T8675] xt_bpf: check failed: parse error 01:17:01 executing program 4: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x1c00}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) [ 1962.889378][ T8679] xt_bpf: check failed: parse error 01:17:01 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xd803}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) [ 1963.014157][ T8682] xt_bpf: check failed: parse error [ 1963.017341][ T8685] xt_bpf: check failed: parse error [ 1963.134662][ T8689] xt_bpf: check failed: parse error [ 1963.190166][ T8690] xt_bpf: check failed: parse error 01:17:02 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:02 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x11000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:02 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xdc03}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:17:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="18020000f2ffffff0000000000000000850000002c00000095000000000000003d789ade838a5ad00c21f97a9d6f55528c474cb385573d9f5ec0798d497a5d0ab93dbb637fd8de14970b4f76b599913ff77098a8cd276dee070239f048bff4c9d61b5c334ef7384130fd875789e46307b8f29c46149360bea59a42011aabb3125f93a06d27b6cf4f033c6000c3ab63ee03e9e7023574b86ce473bc8964c32f955d410083f7567775a2ca15dbbf01550310a78644e801f1753107cee250cb376879ae14b9e1ab98703bc7db41925c55b0a4141ae3c08d264831d0f6365469c356218500000000000000000000000000000000000000000000001a18f6de00bb8c95f8bdc2a54e6aefee88e5b1f6fdbc3a483235918073d11474cfa5d71d92c9bd2b72c3ce63d47075ae7c59d82cea1243db36970e2f56ae270cb56281877934e999394a7dfe2bb6a29394c82bfdffaedc4df6f74e8f286454fca6300d100e7eb8717c8528e445fbefe6a3139191529f22e4c0435e5c53e469f70c08bdff633307bbf119ffdb2e1d717eb268eea7322da5fda4fc19af52289d000f2dd88dda869c8a84dbc54c10bc7fee0486fa294b41c1d4dc44a9801c34ad96bbd834c7dd71160dfaf15a150d0a0b01a6168858b5d085a8b3ca5c3bd8534edc32c0bd1fdd112a1dc6f708cbe1a9432887e17fa9e6f63c1d86f6cec7b362ae4fe101db6870f021269a23a10d6f1301c86b2319d220cf568a6289c751e0c0098d57ff070615e9f21e6e71b281c016d42413122b787041d4b77e3bbabd945fd44eab70d205764e8a61420b"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r3 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) recvmmsg(r3, &(0x7f00000046c0)=[{{&(0x7f00000000c0)=@isdn, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/5, 0x5}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f0000001880)=""/4096, 0x1000}], 0x5}, 0x3}, {{&(0x7f00000004c0)=@phonet, 0x80, &(0x7f0000000280)=[{&(0x7f0000000540)=""/223, 0xdf}, {&(0x7f0000000640)=""/119, 0x77}], 0x2, &(0x7f00000006c0)=""/5, 0x5}, 0x6}, {{&(0x7f0000000700)=@xdp, 0xfffffffffffffc82, &(0x7f0000002b40)=[{&(0x7f0000002880)=""/108, 0x6c}, {&(0x7f0000002900)=""/77, 0x4d}, {&(0x7f0000002980)=""/164, 0xa4}, {&(0x7f0000002a40)=""/242, 0xf2}], 0x4}, 0x6}, {{&(0x7f0000002b80)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000003f80)=[{&(0x7f0000002c00)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/241, 0xf1}, {&(0x7f0000003d00)=""/214, 0xd6}, {&(0x7f0000003e00)=""/44, 0x2c}, {&(0x7f0000003e40)=""/158, 0x9e}, {&(0x7f0000003f00)=""/79, 0x4f}], 0x6}, 0x2}, {{&(0x7f0000004000)=@caif=@dgm, 0x80, &(0x7f0000004580)=[{&(0x7f0000004080)=""/191, 0xbf}, {&(0x7f0000004140)=""/121, 0x79}, {&(0x7f0000004d40)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/99, 0x63}, {&(0x7f0000004240)=""/48, 0x30}, {&(0x7f0000004280)=""/77, 0x4d}, {&(0x7f0000004300)=""/152, 0x98}, {&(0x7f00000043c0)=""/211, 0xd3}, {&(0x7f00000044c0)=""/155, 0x9b}, {&(0x7f0000005d40)=""/4096, 0x1000}], 0xa, &(0x7f0000004640)=""/107, 0x6b}, 0x101}], 0x5, 0x1, &(0x7f0000004800)={0x77359400}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r4, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r5, 0x0, 0x0) [ 1963.944587][ T8693] xt_bpf: check failed: parse error 01:17:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:17:02 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:02 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xde00}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0x20000014}) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) epoll_wait(r2, &(0x7f0000000400)=[{}], 0x1, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x10, 0xb00}, {r2, 0x4b57, 0x64}], 0x10, 0x0, 0x0, 0x1473bf3) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000380)=[0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000700)=[{}], 0x8, 0x0, 0x0, &(0x7f00000008c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000003c0)={'erspan0\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r5]}) write$binfmt_script(r4, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r4, 0x0) r6 = bpf$ITER_CREATE(0x21, 0x0, 0x0) setsockopt$netrom_NETROM_T2(r6, 0x103, 0x2, &(0x7f0000000440)=0x8, 0x4) ioctl$NS_GET_OWNER_UID(r6, 0xb704, &(0x7f0000000480)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in, @in=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) r7 = accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r7, &(0x7f0000004d00)=[{{&(0x7f0000000300), 0x80, 0x0, 0x0, &(0x7f0000000780)=""/233, 0xe9}}], 0x1, 0x0, 0x0) 01:17:02 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x12000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:17:02 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x12030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:17:03 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xe403}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r3 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) recvmmsg(r3, &(0x7f00000046c0)=[{{&(0x7f00000000c0)=@isdn, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/5, 0x5}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f0000001880)=""/4096, 0x1000}], 0x5}, 0x3}, {{&(0x7f00000004c0)=@phonet, 0x80, &(0x7f0000000280)=[{&(0x7f0000000540)=""/223, 0xdf}, {&(0x7f0000000640)=""/119, 0x77}], 0x2, &(0x7f00000006c0)=""/5, 0x5}, 0x6}, {{&(0x7f0000000700)=@xdp, 0xfffffffffffffc82, &(0x7f0000002b40)=[{&(0x7f0000002880)=""/108, 0x6c}, {&(0x7f0000002900)=""/77, 0x4d}, {&(0x7f0000002980)=""/164, 0xa4}, {&(0x7f0000002a40)=""/242, 0xf2}], 0x4}, 0x6}, {{&(0x7f0000002b80)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000003f80)=[{&(0x7f0000002c00)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/241, 0xf1}, {&(0x7f0000003d00)=""/214, 0xd6}, {&(0x7f0000003e00)=""/44, 0x2c}, {&(0x7f0000003e40)=""/158, 0x9e}, {&(0x7f0000003f00)=""/79, 0x4f}], 0x6}, 0x2}, {{&(0x7f0000004000)=@caif=@dgm, 0x80, &(0x7f0000004580)=[{&(0x7f0000004080)=""/191, 0xbf}, {&(0x7f0000004140)=""/121, 0x79}, {&(0x7f0000004d40)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/99, 0x63}, {&(0x7f0000004240)=""/48, 0x30}, {&(0x7f0000004280)=""/77, 0x4d}, {&(0x7f0000004300)=""/152, 0x98}, {&(0x7f00000043c0)=""/211, 0xd3}, {&(0x7f00000044c0)=""/155, 0x9b}, {&(0x7f0000005d40)=""/4096, 0x1000}], 0xa, &(0x7f0000004640)=""/107, 0x6b}, 0x101}], 0x5, 0x1, &(0x7f0000004800)={0x77359400}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r4, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r5, 0x0, 0x0) 01:17:03 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="b4000000000b00007910000000000000c310000aa1000000950074000000000031fb0d3a42319fa204399d17d34e075fdcda533ab1aa71ab1d764152e6cb25dadc7ded5d05000000adea9fca11027d29066927603deb92de3141e8ed7ac5b8902070213cdfdc5d6c4890cdeb50347c2f060581172b94c6ba22a2b58eb6cbad46ed6e7965a2ba103b0b36f790bb41931f9a3d4dd127c1b4e49f7468f5e603950c4f67581c92ef8a7e8ece0000b9528454a057b5e6760808e8baf4c29861676e03bab49d5beadea592c048959303dfd62c46eac29e990747b62b9ea11385d59e5f60131dad5e782991cc922cfb97983a839d16b986ce8a939705aaf5a9443214f515c6026d0655d9efa6f49d6d9c8b6a59e34265019c90dbb4ef7c8fe90155436b571116d3b4bfc2d71b7a2a966a628549b1b8c46986d9ba8e0ace933a95"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:03 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x14010000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r2, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r3, 0x0, 0x0) 01:17:03 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:03 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x16030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:03 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xe700}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="18020000f2ffffff0000000000000000850000002c00000095000000000000003d789ade838a5ad00c21f97a9d6f55528c474cb385573d9f5ec0798d497a5d0ab93dbb637fd8de14970b4f76b599913ff77098a8cd276dee070239f048bff4c9d61b5c334ef7384130fd875789e46307b8f29c46149360bea59a42011aabb3125f93a06d27b6cf4f033c6000c3ab63ee03e9e7023574b86ce473bc8964c32f955d410083f7567775a2ca15dbbf01550310a78644e801f1753107cee250cb376879ae14b9e1ab98703bc7db41925c55b0a4141ae3c08d264831d0f6365469c356218500000000000000000000000000000000000000000000001a18f6de00bb8c95f8bdc2a54e6aefee88e5b1f6fdbc3a483235918073d11474cfa5d71d92c9bd2b72c3ce63d47075ae7c59d82cea1243db36970e2f56ae270cb56281877934e999394a7dfe2bb6a29394c82bfdffaedc4df6f74e8f286454fca6300d100e7eb8717c8528e445fbefe6a3139191529f22e4c0435e5c53e469f70c08bdff633307bbf119ffdb2e1d717eb268eea7322da5fda4fc19af52289d000f2dd88dda869c8a84dbc54c10bc7fee0486fa294b41c1d4dc44a9801c34ad96bbd834c7dd71160dfaf15a150d0a0b01a6168858b5d085a8b3ca5c3bd8534edc32c0bd1fdd112a1dc6f708cbe1a9432887e17fa9e6f63c1d86f6cec7b362ae4fe101db6870f021269a23a10d6f1301c86b2319d220cf568a6289c751e0c0098d57ff070615e9f21e6e71b281c016d42413122b787041d4b77e3bbabd945fd44eab70d205764e8a61420b"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:17:03 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x18030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r2, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r3, 0x0, 0x0) 01:17:04 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xe803}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:17:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r2, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r3, 0x0, 0x0) 01:17:05 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:17:05 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x1c000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:05 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="b4000000000b00007910000000000000c310000aa1000000950074000000000031fb0d3a42319fa204399d17d34e075fdcda533ab1aa71ab1d764152e6cb25dadc7ded5d05000000adea9fca11027d29066927603deb92de3141e8ed7ac5b8902070213cdfdc5d6c4890cdeb50347c2f060581172b94c6ba22a2b58eb6cbad46ed6e7965a2ba103b0b36f790bb41931f9a3d4dd127c1b4e49f7468f5e603950c4f67581c92ef8a7e8ece0000b9528454a057b5e6760808e8baf4c29861676e03bab49d5beadea592c048959303dfd62c46eac29e990747b62b9ea11385d59e5f60131dad5e782991cc922cfb97983a839d16b986ce8a939705aaf5a9443214f515c6026d0655d9efa6f49d6d9c8b6a59e34265019c90dbb4ef7c8fe90155436b571116d3b4bfc2d71b7a2a966a628549b1b8c46986d9ba8e0ace933a95"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:05 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xf203}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, 0x0) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:17:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) 01:17:05 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x1f000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, 0x0) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:17:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 01:17:05 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xf803}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:05 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x20000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="18020000f2ffffff0000000000000000850000002c00000095000000000000003d789ade838a5ad00c21f97a9d6f55528c474cb385573d9f5ec0798d497a5d0ab93dbb637fd8de14970b4f76b599913ff77098a8cd276dee070239f048bff4c9d61b5c334ef7384130fd875789e46307b8f29c46149360bea59a42011aabb3125f93a06d27b6cf4f033c6000c3ab63ee03e9e7023574b86ce473bc8964c32f955d410083f7567775a2ca15dbbf01550310a78644e801f1753107cee250cb376879ae14b9e1ab98703bc7db41925c55b0a4141ae3c08d264831d0f6365469c356218500000000000000000000000000000000000000000000001a18f6de00bb8c95f8bdc2a54e6aefee88e5b1f6fdbc3a483235918073d11474cfa5d71d92c9bd2b72c3ce63d47075ae7c59d82cea1243db36970e2f56ae270cb56281877934e999394a7dfe2bb6a29394c82bfdffaedc4df6f74e8f286454fca6300d100e7eb8717c8528e445fbefe6a3139191529f22e4c0435e5c53e469f70c08bdff633307bbf119ffdb2e1d717eb268eea7322da5fda4fc19af52289d000f2dd88dda869c8a84dbc54c10bc7fee0486fa294b41c1d4dc44a9801c34ad96bbd834c7dd71160dfaf15a150d0a0b01a6168858b5d085a8b3ca5c3bd8534edc32c0bd1fdd112a1dc6f708cbe1a9432887e17fa9e6f63c1d86f6cec7b362ae4fe101db6870f021269a23a10d6f1301c86b2319d220cf568a6289c751e0c0098d57ff070615e9f21e6e71b281c016d42413122b787041d4b77e3bbabd945fd44eab70d205764e8a61420b"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 01:17:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, 0x0) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:17:06 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xfc02}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:06 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x20020000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:06 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:06 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x0, 0x79, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:17:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1968.222026][ T8784] __bpf_mt_check_bytecode: 23 callbacks suppressed [ 1968.225677][ T8785] xt_bpf: check failed: parse error [ 1968.227748][ T8784] xt_bpf: check failed: parse error 01:17:06 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xff00}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:06 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x22010000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) [ 1968.400255][ T8793] xt_bpf: check failed: parse error 01:17:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r3, 0x0, 0x0) 01:17:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x0, 0x79, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:17:06 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xff0f}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) [ 1968.502811][ T8795] xt_bpf: check failed: parse error 01:17:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) 01:17:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x0, 0x79, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) [ 1968.585477][ T8802] xt_bpf: check failed: parse error 01:17:07 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x2a030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) [ 1968.729727][ T8807] xt_bpf: check failed: parse error [ 1968.861898][ T8813] xt_bpf: check failed: parse error [ 1968.903703][ T8814] xt_bpf: check failed: parse error 01:17:08 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:08 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x12000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="18020000f2ffffff0000000000000000850000002c00000095000000000000003d789ade838a5ad00c21f97a9d6f55528c474cb385573d9f5ec0798d497a5d0ab93dbb637fd8de14970b4f76b599913ff77098a8cd276dee070239f048bff4c9d61b5c334ef7384130fd875789e46307b8f29c46149360bea59a42011aabb3125f93a06d27b6cf4f033c6000c3ab63ee03e9e7023574b86ce473bc8964c32f955d410083f7567775a2ca15dbbf01550310a78644e801f1753107cee250cb376879ae14b9e1ab98703bc7db41925c55b0a4141ae3c08d264831d0f6365469c356218500000000000000000000000000000000000000000000001a18f6de00bb8c95f8bdc2a54e6aefee88e5b1f6fdbc3a483235918073d11474cfa5d71d92c9bd2b72c3ce63d47075ae7c59d82cea1243db36970e2f56ae270cb56281877934e999394a7dfe2bb6a29394c82bfdffaedc4df6f74e8f286454fca6300d100e7eb8717c8528e445fbefe6a3139191529f22e4c0435e5c53e469f70c08bdff633307bbf119ffdb2e1d717eb268eea7322da5fda4fc19af52289d000f2dd88dda869c8a84dbc54c10bc7fee0486fa294b41c1d4dc44a9801c34ad96bbd834c7dd71160dfaf15a150d0a0b01a6168858b5d085a8b3ca5c3bd8534edc32c0bd1fdd112a1dc6f708cbe1a9432887e17fa9e6f63c1d86f6cec7b362ae4fe101db6870f021269a23a10d6f1301c86b2319d220cf568a6289c751e0c0098d57ff070615e9f21e6e71b281c016d42413122b787041d4b77e3bbabd945fd44eab70d205764e8a61420b"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) 01:17:08 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x32010000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x0, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:17:08 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) [ 1969.705627][ T8818] xt_bpf: check failed: parse error [ 1969.736814][ T8822] xt_bpf: check failed: parse error 01:17:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) 01:17:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x0, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:17:08 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x36000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:08 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x20000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) 01:17:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x0, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:17:09 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:09 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:17:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) 01:17:09 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x3c020000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:09 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x3ffff}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="18020000f2ffffff0000000000000000850000002c00000095000000000000003d789ade838a5ad00c21f97a9d6f55528c474cb385573d9f5ec0798d497a5d0ab93dbb637fd8de14970b4f76b599913ff77098a8cd276dee070239f048bff4c9d61b5c334ef7384130fd875789e46307b8f29c46149360bea59a42011aabb3125f93a06d27b6cf4f033c6000c3ab63ee03e9e7023574b86ce473bc8964c32f955d410083f7567775a2ca15dbbf01550310a78644e801f1753107cee250cb376879ae14b9e1ab98703bc7db41925c55b0a4141ae3c08d264831d0f6365469c356218500000000000000000000000000000000000000000000001a18f6de00bb8c95f8bdc2a54e6aefee88e5b1f6fdbc3a483235918073d11474cfa5d71d92c9bd2b72c3ce63d47075ae7c59d82cea1243db36970e2f56ae270cb56281877934e999394a7dfe2bb6a29394c82bfdffaedc4df6f74e8f286454fca6300d100e7eb8717c8528e445fbefe6a3139191529f22e4c0435e5c53e469f70c08bdff633307bbf119ffdb2e1d717eb268eea7322da5fda4fc19af52289d000f2dd88dda869c8a84dbc54c10bc7fee0486fa294b41c1d4dc44a9801c34ad96bbd834c7dd71160dfaf15a150d0a0b01a6168858b5d085a8b3ca5c3bd8534edc32c0bd1fdd112a1dc6f708cbe1a9432887e17fa9e6f63c1d86f6cec7b362ae4fe101db6870f021269a23a10d6f1301c86b2319d220cf568a6289c751e0c0098d57ff070615e9f21e6e71b281c016d42413122b787041d4b77e3bbabd945fd44eab70d205764e8a61420b"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 01:17:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:17:09 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x3e000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:09 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x40000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) 01:17:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:17:10 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:10 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) 01:17:10 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x100000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:17:10 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x3e020000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:10 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:17:10 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x3e030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:10 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x200000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:11 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x3f000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:12 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x200100}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:17:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:12 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x40000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:12 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="b4000000000b00007910000000000000c310000aa1000000950074000000000031fb0d3a42319fa204399d17d34e075fdcda533ab1aa71ab1d764152e6cb25dadc7ded5d05000000adea9fca11027d29066927603deb92de3141e8ed7ac5b8902070213cdfdc5d6c4890cdeb50347c2f060581172b94c6ba22a2b58eb6cbad46ed6e7965a2ba103b0b36f790bb41931f9a3d4dd127c1b4e49f7468f5e603950c4f67581c92ef8a7e8ece0000b9528454a057b5e6760808e8baf4c29861676e03bab49d5beadea592c048959303dfd62c46eac29e990747b62b9ea11385d59e5f60131dad5e782991cc922cfb97983a839d16b986ce8a939705aaf5a9443214f515c6026d0655d9efa6f49d6d9c8b6a59e34265019c90dbb4ef7c8fe90155436b571116d3b4bfc2d71b7a2a966a628549b1b8c46986d9ba8e0ace933a95"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:12 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) accept$alg(r4, 0x0, 0x0) 01:17:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) [ 1973.843092][ T8901] __bpf_mt_check_bytecode: 17 callbacks suppressed [ 1973.866741][ T8903] xt_bpf: check failed: parse error [ 1973.874074][ T8901] xt_bpf: check failed: parse error 01:17:12 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x40030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:12 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x1000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="18020000f2ffffff0000000000000000850000002c00000095000000000000003d789ade838a5ad00c21f97a9d6f55528c474cb385573d9f5ec0798d497a5d0ab93dbb637fd8de14970b4f76b599913ff77098a8cd276dee070239f048bff4c9d61b5c334ef7384130fd875789e46307b8f29c46149360bea59a42011aabb3125f93a06d27b6cf4f033c6000c3ab63ee03e9e7023574b86ce473bc8964c32f955d410083f7567775a2ca15dbbf01550310a78644e801f1753107cee250cb376879ae14b9e1ab98703bc7db41925c55b0a4141ae3c08d264831d0f6365469c356218500000000000000000000000000000000000000000000001a18f6de00bb8c95f8bdc2a54e6aefee88e5b1f6fdbc3a483235918073d11474cfa5d71d92c9bd2b72c3ce63d47075ae7c59d82cea1243db36970e2f56ae270cb56281877934e999394a7dfe2bb6a29394c82bfdffaedc4df6f74e8f286454fca6300d100e7eb8717c8528e445fbefe6a3139191529f22e4c0435e5c53e469f70c08bdff633307bbf119ffdb2e1d717eb268eea7322da5fda4fc19af52289d000f2dd88dda869c8a84dbc54c10bc7fee0486fa294b41c1d4dc44a9801c34ad96bbd834c7dd71160dfaf15a150d0a0b01a6168858b5d085a8b3ca5c3bd8534edc32c0bd1fdd112a1dc6f708cbe1a9432887e17fa9e6f63c1d86f6cec7b362ae4fe101db6870f021269a23a10d6f1301c86b2319d220cf568a6289c751e0c0098d57ff070615e9f21e6e71b281c016d42413122b787041d4b77e3bbabd945fd44eab70d205764e8a61420b"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) accept$alg(r4, 0x0, 0x0) 01:17:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) [ 1974.066482][ T8912] xt_bpf: check failed: parse error [ 1974.107070][ T8917] xt_bpf: check failed: parse error 01:17:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="18020000f2ffffff0000000000000000850000002c00000095000000000000003d789ade838a5ad00c21f97a9d6f55528c474cb385573d9f5ec0798d497a5d0ab93dbb637fd8de14970b4f76b599913ff77098a8cd276dee070239f048bff4c9d61b5c334ef7384130fd875789e46307b8f29c46149360bea59a42011aabb3125f93a06d27b6cf4f033c6000c3ab63ee03e9e7023574b86ce473bc8964c32f955d410083f7567775a2ca15dbbf01550310a78644e801f1753107cee250cb376879ae14b9e1ab98703bc7db41925c55b0a4141ae3c08d264831d0f6365469c356218500000000000000000000000000000000000000000000001a18f6de00bb8c95f8bdc2a54e6aefee88e5b1f6fdbc3a483235918073d11474cfa5d71d92c9bd2b72c3ce63d47075ae7c59d82cea1243db36970e2f56ae270cb56281877934e999394a7dfe2bb6a29394c82bfdffaedc4df6f74e8f286454fca6300d100e7eb8717c8528e445fbefe6a3139191529f22e4c0435e5c53e469f70c08bdff633307bbf119ffdb2e1d717eb268eea7322da5fda4fc19af52289d000f2dd88dda869c8a84dbc54c10bc7fee0486fa294b41c1d4dc44a9801c34ad96bbd834c7dd71160dfaf15a150d0a0b01a6168858b5d085a8b3ca5c3bd8534edc32c0bd1fdd112a1dc6f708cbe1a9432887e17fa9e6f63c1d86f6cec7b362ae4fe101db6870f021269a23a10d6f1301c86b2319d220cf568a6289c751e0c0098d57ff070615e9f21e6e71b281c016d42413122b787041d4b77e3bbabd945fd44eab70d205764e8a61420b"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) 01:17:12 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x2000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:12 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x42000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) [ 1974.240353][ T8919] xt_bpf: check failed: parse error [ 1974.271009][ T8923] xt_bpf: check failed: parse error [ 1974.366671][ T8928] xt_bpf: check failed: parse error [ 1974.497721][ T8934] xt_bpf: check failed: parse error 01:17:13 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x2030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) [ 1974.990966][ T8937] xt_bpf: check failed: parse error 01:17:13 executing program 4: socket$alg(0x26, 0x5, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:13 executing program 0: socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r2 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) recvmmsg(r2, &(0x7f00000046c0)=[{{&(0x7f00000000c0)=@isdn, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/5, 0x5}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f0000001880)=""/4096, 0x1000}], 0x5}, 0x3}, {{&(0x7f00000004c0)=@phonet, 0x80, &(0x7f0000000280)=[{&(0x7f0000000540)=""/223, 0xdf}, {&(0x7f0000000640)=""/119, 0x77}], 0x2, &(0x7f00000006c0)=""/5, 0x5}, 0x6}, {{&(0x7f0000000700)=@xdp, 0xfffffffffffffc82, &(0x7f0000002b40)=[{&(0x7f0000002880)=""/108, 0x6c}, {&(0x7f0000002900)=""/77, 0x4d}, {&(0x7f0000002980)=""/164, 0xa4}, {&(0x7f0000002a40)=""/242, 0xf2}], 0x4}, 0x6}, {{&(0x7f0000002b80)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000003f80)=[{&(0x7f0000002c00)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/241, 0xf1}, {&(0x7f0000003d00)=""/214, 0xd6}, {&(0x7f0000003e00)=""/44, 0x2c}, {&(0x7f0000003e40)=""/158, 0x9e}, {&(0x7f0000003f00)=""/79, 0x4f}], 0x6}, 0x2}, {{&(0x7f0000004000)=@caif=@dgm, 0x80, &(0x7f0000004580)=[{&(0x7f0000004080)=""/191, 0xbf}, {&(0x7f0000004140)=""/121, 0x79}, {&(0x7f0000004d40)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/99, 0x63}, {&(0x7f0000004240)=""/48, 0x30}, {&(0x7f0000004280)=""/77, 0x4d}, {&(0x7f0000004300)=""/152, 0x98}, {&(0x7f00000043c0)=""/211, 0xd3}, {&(0x7f00000044c0)=""/155, 0x9b}, {&(0x7f0000005d40)=""/4096, 0x1000}], 0xa, &(0x7f0000004640)=""/107, 0x6b}, 0x101}], 0x5, 0x1, &(0x7f0000004800)={0x77359400}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:17:13 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x48000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:13 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:13 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="b4000000000b00007910000000000000c310000aa1000000950074000000000031fb0d3a42319fa204399d17d34e075fdcda533ab1aa71ab1d764152e6cb25dadc7ded5d05000000adea9fca11027d29066927603deb92de3141e8ed7ac5b8902070213cdfdc5d6c4890cdeb50347c2f060581172b94c6ba22a2b58eb6cbad46ed6e7965a2ba103b0b36f790bb41931f9a3d4dd127c1b4e49f7468f5e603950c4f67581c92ef8a7e8ece0000b9528454a057b5e6760808e8baf4c29861676e03bab49d5beadea592c048959303dfd62c46eac29e990747b62b9ea11385d59e5f60131dad5e782991cc922cfb97983a839d16b986ce8a939705aaf5a9443214f515c6026d0655d9efa6f49d6d9c8b6a59e34265019c90dbb4ef7c8fe90155436b571116d3b4bfc2d71b7a2a966a628549b1b8c46986d9ba8e0ace933a95"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:13 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x3000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) [ 1975.312762][ T8939] xt_bpf: check failed: parse error 01:17:13 executing program 4: socket$alg(0x26, 0x5, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:13 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x4000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:13 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x4a000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:13 executing program 0: socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r2 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) recvmmsg(r2, &(0x7f00000046c0)=[{{&(0x7f00000000c0)=@isdn, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/229, 0xe5}, {&(0x7f0000000240)=""/5, 0x5}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f0000001880)=""/4096, 0x1000}], 0x5}, 0x3}, {{&(0x7f00000004c0)=@phonet, 0x80, &(0x7f0000000280)=[{&(0x7f0000000540)=""/223, 0xdf}, {&(0x7f0000000640)=""/119, 0x77}], 0x2, &(0x7f00000006c0)=""/5, 0x5}, 0x6}, {{&(0x7f0000000700)=@xdp, 0xfffffffffffffc82, &(0x7f0000002b40)=[{&(0x7f0000002880)=""/108, 0x6c}, {&(0x7f0000002900)=""/77, 0x4d}, {&(0x7f0000002980)=""/164, 0xa4}, {&(0x7f0000002a40)=""/242, 0xf2}], 0x4}, 0x6}, {{&(0x7f0000002b80)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000003f80)=[{&(0x7f0000002c00)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/241, 0xf1}, {&(0x7f0000003d00)=""/214, 0xd6}, {&(0x7f0000003e00)=""/44, 0x2c}, {&(0x7f0000003e40)=""/158, 0x9e}, {&(0x7f0000003f00)=""/79, 0x4f}], 0x6}, 0x2}, {{&(0x7f0000004000)=@caif=@dgm, 0x80, &(0x7f0000004580)=[{&(0x7f0000004080)=""/191, 0xbf}, {&(0x7f0000004140)=""/121, 0x79}, {&(0x7f0000004d40)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/99, 0x63}, {&(0x7f0000004240)=""/48, 0x30}, {&(0x7f0000004280)=""/77, 0x4d}, {&(0x7f0000004300)=""/152, 0x98}, {&(0x7f00000043c0)=""/211, 0xd3}, {&(0x7f00000044c0)=""/155, 0x9b}, {&(0x7f0000005d40)=""/4096, 0x1000}], 0xa, &(0x7f0000004640)=""/107, 0x6b}, 0x101}], 0x5, 0x1, &(0x7f0000004800)={0x77359400}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000004880)={0x0, 0x1, 0x79, 0x100000000}) accept$alg(r3, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004840), 0x8) accept$alg(r4, 0x0, 0x0) 01:17:13 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:13 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x5000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:13 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x4c000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:13 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:14 executing program 0: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x600}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) [ 1976.112933][ T1218] ieee802154 phy1 wpan1: encryption failed: -22 01:17:14 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:15 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:15 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x6000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:15 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x50010000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0x20000014}) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) epoll_wait(r2, &(0x7f0000000400)=[{}], 0x1, 0x2) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x10, 0xb00}, {r2, 0x4b57, 0x64}], 0x10, 0x0, 0x0, 0x1473bf3) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000380)=[0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000700)=[{}], 0x8, 0x0, 0x0, &(0x7f00000008c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f00000003c0)={'erspan0\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r6]}) write$binfmt_script(r5, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r5, 0x0) r8 = bpf$ITER_CREATE(0x21, 0x0, 0x0) setsockopt$netrom_NETROM_T2(r8, 0x103, 0x2, &(0x7f0000000440)=0x8, 0x4) ioctl$NS_GET_OWNER_UID(r8, 0xb704, &(0x7f0000000480)=0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000dc0)=[{{&(0x7f0000000440)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000500)="52a3e040322925e3eaa8c45ba5af", 0xe}], 0x1, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r5, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r7]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}], 0x70, 0x4}}, {{&(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000840)=[{&(0x7f0000000740)}, {&(0x7f00000007c0)="654db26cdbffdd999872a40d6b9650d147281b175cbde7fa30efcee358c0f305a557b39cf65c7d222f6e72fb23e59881795e00589b635717d8acc08c6a90affcb952be2437ff45803261b4d38e669f13592714b46bd3d79cb699b0f7851136fca7ab8b18d8cc186f8f9429064beb27dba125d2aeec3a5a", 0x77}, {0x0}], 0x3, &(0x7f0000000c80)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [r2, r7, r2, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r4, 0xffffffffffffffff, r2, 0xffffffffffffffff, r4, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r9, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}], 0xf8, 0x20051}}], 0x2, 0x40000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) r11 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r11, &(0x7f0000000040)={0x1f, 0xffff, 0x3}, 0x6) r12 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) write$binfmt_misc(r11, &(0x7f0000000200)=ANY=[@ANYBLOB="1700030007", @ANYRES16=r13], 0xd) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000080)=@kern={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)=[{&(0x7f0000000880)={0x55c, 0x3e, 0x4, 0x70bd2d, 0x25dfdbfd, "", [@generic="7caaae5f05fdd05023dc9d6035a7f2d985d719843250f89968b14ade3ccb7c2c06785199efdea9d3dd5d82eef4475387c44b0c9a90e2aca3abc0abca96241a2c76d578c812ff8110a18973460b7d33af582e8297fd206e8533e0b184dc7916c112ba3c2f9238ea0e1455a4eb033c0556120316fc51bbbd693c26a8b1258a6ff0f068fb16b9c9afd8f5101c500a50d533689331b9a6832eb0aaee727c", @typed={0x8, 0x7a, 0x0, 0x0, @u32=0x3f}, @generic="9b1e0ac65440ddccb0937b702e72a1697e59528215fcfae082355ecc3d44d2b23781497b2200b66256e8249e66accdb63cb0519492236c0f8b50d98766d2def1acf6ca6b0ab0fd45bca5c09dec8002cff16d3ec2b6676baee882453d78dbde80c2ef61dd3fc6e276071210ee47e04f4617acaece353ca63bbfa6240fc2c7bdda336c36d48084212de87f568adb3326ae890cf37cbd8a9b1f173e8803d31620f5c616b2448da46eb2", @nested={0x10c, 0x62, 0x0, 0x1, [@typed={0x4, 0x60}, @typed={0x8, 0xc, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="b76129affb05cd420d97e262593959773406fcbbcdcac1d8fba455ec868a432472d4b4976f98ff5743d23d0d8576e5da0ae32a7feba2e74fb899179d105c0fcb6f43ec87ec953871b63107979db2367b966fb86f9e2778a5c6c9288eabd2f25602cd69f4a0b708d01bb4afeda6b5084a602db7795db3205a94e52608ab3a9a65f8cd1d700528e58314e29056aec28c72234c4e4d40530e31c108fdf9900c66c9a6f45bdf7f2b55bb4781d1a231dc5094c513b68132a7bf157ccfd173d0f89786dd98e40b114a62b9a6c93a569f018a22fac48d5e995a5456dde1b39da07576b7425ef5918ea08494af5b5534dae9cdc3a45673f8dd5b87d5eb6a4603"]}, @nested={0x31, 0x4, 0x0, 0x1, [@typed={0x8, 0x67, 0x0, 0x0, @fd}, @typed={0x8, 0x63, 0x0, 0x0, @ipv4=@empty}, @generic="cd562f53ae1b08214144e05ae777201cdb", @typed={0x4, 0x3a}, @typed={0x8, 0x36, 0x0, 0x0, @ipv4=@local}]}, @typed={0x8, 0x8d, 0x0, 0x0, @ipv4=@empty}, @nested={0xe0, 0xa, 0x0, 0x1, [@generic="d9317d13e21233e11e45c82cf8a44fe07b1eccbd1218cf46f3e18ec127b501eea5d699cd03809813f5b54c0eb00144a16f1e2dd1839f204c7594ba347bda8788c95c56b2c8a4cabc6814380d528271e2b8312242d20c2e26e75bc07d6a9b63a236dbdda1b0d1e84f39a9992bc3ddc4418a667276e0df97cd32bb61758c0153b57e25d4fda49f8fcc75fea16de088b703ff4a91329f016a4a", @generic="796f3a43b0d9f4cd13b3346c734b80954e83857f5c707a831b13f8aaa37a871d8b6fea168e10e5681bc1a3487a48053223f8ab5b801bd40d6a90103f09f5cee5b1e72cb6"]}, @generic="f8a121273e03e52ff62410c2b1dca82f7cd654f5de887b315810fdf641011578419273274b87821b6401fe6d8dc9ecabe26a77b45c524ea2de7e5ac3a69db75ffa6887df0a7f9e1d36817031925d86633cf24f44fd4deac1e77cda11278dcbf8fb45e6159e2266066d308a553250f769d074e5701801dfc35bcdd10f6faa7ff5f266c30b0d646cb804005c6f534ce3c99555fd31c90047ed5050e78ed9b3b3caef1059d52fb5f281f3caf9a9da045429fa5ad64d46a1d24a301d7d16b5cbc4d95e17e7196d1b147207c02049beffde5e15ed123d85d634500ea87a20fdd91d75684e88852d25bd00e5", @generic="0677f7bc4638f8d59e390c0cc56effd68ecdeac618e52a733bd2e9201781893bfb9c53338210fa09ecb695e8cddc0474c7864c4fffdf3e7cb937c04c32c488b40edf46568a0ee8a27bfaa28a3da646dfc775410dc8be3cd149ad1a114857914fb5e67247ede5f345ce3521c67697089ddebb0c1baa9bee7466f54c838ad7c12058d50d85707e3b81122f434393050abcd34633099db1932b3944fa83123b49f0dc2dbd98c53859a499cf8b22b9f2a63209204f6462a94bb37ed8b04832f2bf05bbaa3752ea3b86ed906430cc097c9456008cccf8f3b6c3ea8554f355bb13d5af39f79ed00885ff43daeb86afd5"]}, 0x55c}, {&(0x7f0000000e00)={0x12d8, 0x2a, 0x2, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x7f, 0x0, 0x0, @uid=0xee01}, @nested={0x11f4, 0x7b, 0x0, 0x1, [@generic="82d3b8b5422463c85b7d080f4f87a0f55c7a9f3b3a1a672a4c7ff8e29a44faa25ac59944a6aa62c1d46d1c29a1ea9f0457edd49ef24ee6bdc11aec3206524cd1b30ab6fb9446c7e427fac506cf6ae90e0d3249b46418eb875ab97986eb88f2fe90cc", @generic="a49487cd03216e4e4f18e3a58709944ba84491739786bff216741466f07e87e7d8016cffef8e", @generic="004d17642438edc2a32923388f90838c56b1ed4800689998c50d03e79386a33398d0502410f66b9dfd94d2c7a7f7f69d6cd926dbeb65174f238d23455ab9ed9036cb900ca747a48ab0321949470a2945064497f0bc1e9feb63fcde0c94463da80d670bb0f9d924a5894d45fb81152c15f22160f4984a564ab241e023152d9acb04187cf0efcd274ae48311197de66d6575b333e251d38b49c2e24a495815580392822887ea57458c4dbaaedae514e5e72297d9f626e1abb8", @generic="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", @generic="8f7caa3551fc248d3246f1150415bcceec83a28c202de4997d519f74ba91041960a5ab6c88509794b600f8417a24f54dd905a46f9e3cfdbf897cfe87c898d9854378882e31bda90f3940bef06bbcd9bc18cf1c7864c4bb37ddcbcb038db6bc5285ac326b2a4cae9a69d0e3f62a21f5eb4060ef5f4d03c39c2bc60696737efb6049ac66ed8df7f87940113efc", @typed={0x8, 0x4d, 0x0, 0x0, @fd}, @typed={0x8, 0x70, 0x0, 0x0, @pid}, @typed={0x8, 0x58, 0x0, 0x0, @ipv4=@private=0xa010100}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x12}]}, @generic="b2e304c9b9849362a58ad853d7e2af4da8c433597c94c44e9cf4033e2433ab5d226998ee3ce9069113c278941eb34396fc200c8fe062e5ff849722ba34223c9b18f049a9c9065afd34ff99326a429c190bd28d53980d7d4732059db139c3025d726895f924c0a8e80bbf4267b36da7795c20c7edd77d829dc8a0bbbae985f26b06b62e60e28f5a963a9aadd4ebef4fe47bca8a1a8196e23c8823cfe9a98e0e27cbcdc14e90fa032b8d3a5a1341ac26bb4f22924456fd9a9a09fb93439f6113e3c96c2dd52256a396427933"]}, 0x12d8}, {&(0x7f0000002100)={0x1674, 0x25, 0x100, 0x70bd2d, 0x25dfdbff, "", [@nested={0x1287, 0x86, 0x0, 0x1, [@typed={0xc, 0x60, 0x0, 0x0, @u64=0x100000000}, @generic="e7069b58a21f7278ed2493341cd0d232898794a7fb432f39931809a6ed646231a3b4844448582158cc04c0b20acb943e64fe28299afc47f6f0932c04badc3463fcb42195e9f2a3eb5930325ceeee2abf5c3bf4a07fe24b656108e6c2917234224d9128ac194a85bc7f8a91a9841094b58281cd663f7c2eca3b9def08f716f50ae0e195d89bdc609296b11db02f6228a78b5a39fa8e8beecc2e1862c2885c80b191fafed501ae350b4ce5", @typed={0x8, 0x86, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x37}}, @typed={0xc, 0x13, 0x0, 0x0, @u64=0x19}, @generic="2424badf0e23bf3bdd4ff1d94a333d9df69648181a454cc2da85e44c8651552c4a1707476b8b276218a276459dd2ecbfbbab7ed515b2c1c14d7f5d24cc47b058964b49ee62b524a75d1ad2dd7f53eee11448797e5b80844fb91d3d91434a66918a677517117f5070936c54f2cc6ad40ce31d922b71635d954b2c821aeaaa86fd8a95bcc1529b267cfbe540f2b7e443f09d9a2b5835224711558f87c5ccb0b612dfc4a01c89aaef2be7b3131dffd09e8812e129b7114d7d7f33ec2804a5d56d", @typed={0x14, 0x70, 0x0, 0x0, @ipv6=@remote}, @generic="e6576dfa27bd590fcb326e9516b019bf0f4130db9f5f6fce4f42bd0a79206caed1eb07c3e9b4bb3f7bebcf9c57bec443923f55157b751f572888eef068ce5a2d90555ebe68b4f9130e1f581a7bf4ccc91fda7fba1701c4d45be9a652a69b164b5857d851625bac384d1d68c50889f3cf875ac4a71119b413d4a516eb8bfaee9d53efd8c57dba953313a08df61a2607cbba102f2aa760d63e45822cf510da30e1378fa7bcb23fd5ff4d53e4a3af88", @generic="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", @generic="9696d5909335cc5c90399bd38a277435ee44b6fff7057e5e100b1993dc5921c29f86b904ab4427c52c59b6c0579895d0", @typed={0x8, 0x60, 0x0, 0x0, @uid}]}, @nested={0x1ba, 0x70, 0x0, 0x1, [@generic="59bb0af9fd19b2d242f5d8c50d6a8a81db188c05f6591de3355776e68a0424df634a89159f3681fb6a6ae56258acdcceb6d2afb206df425eca02b30f9c979fae11857581e2534a606eec505473d366905d6b64b7bad1b35da8571104eb2d10a23afd46ce63351238cfc9f709d96c0ea9d29591d7246c26fc7bef3d4cb8b393fcabb2eef7c2e9b9cfe06f852c5278945e6b1bdb8c54f2a45981217bae4d", @typed={0x8, 0x29, 0x0, 0x0, @uid}, @generic="b039630bf1cd89575a6c7cba41290ff0bcac9702eac1b2364f", @typed={0xf7, 0x80, 0x0, 0x0, @binary="33bc85242101b5d7c595541ee0e9c8cd60abd6c9928427447b50fac5618386f35344190906c70bdd5cfcc7f1d07db2f3cc17bfc8fa8ee94680cc023f13324c24597dc824cb58f2785f91af47b7d3ca8dda373ed2bfe497411f525ed22e087f65e3cd7a7fdaf51c7ca9a34a2142d034cc765679c4e41cc02ca5bac7ed65b7b12163395718ba5b2a761bd5d4a5b7513a486d1f942ee71d3a7dc75f8a30758df3c28db7110cf98b4f9a21c73c4716e4ad0c3d6f9376dc2d1a1d2018c94f6581d2ebb34e8b1a7fc08109f68465d3f6166456a166b9b9169f1f485e02b114ca562f98bec125a5b8ae7a9ad019d45f30ed655edfc509"}]}, @generic="3e618184ef444f8e68eef430d01734db5292c8eaebb46c7170dd639cba092806e595bfcf6feb550317cdcb39a050d74803e5ccc5e01b633cb17257bfb0ea356c79bba98e0b7659c80d9fa005de2d754899e396389f61c988e78e6b45637ad363d49b3829e5591db27c874cb957e1c6ad3443c3845f471a5ce932b8ecc734e01ed58ac5ffc49d1b01e49a5040e2421382f75fb5cad4367c4df0806995009cb0ed31bc4793655054eba5", @typed={0x8, 0x0, 0x0, 0x0, @pid}, @generic="0ff7c8ea8c4f9c3a952aeccab2bccf294ec5e664253514bc786ad434547086e1d037add03609ff0f10cb1b8a4c59013daf5b98ba65aaf791ef9cc287e7a87aeb6af00812d185dc41f8997e616b8b86e2399735236a3dbe24bf1494416dc42e8350b6dfe7ba8f45358ded1e2ab1ffc5865e05aa20e54e133e6e652cf5cade", @generic="f83d48d8b7aea4ba971def1201d9f925292552ac79cd288f1740d358a0a7b62cbe34d6caf42585eb8a9c6630dbb798b44d9d6899d5bc22b036a4cbc70951a72731bb3616c978512023f50f15e98f25b09b887e91178366158fcde0d00ce58227b443840f489d5b47a5e2f8c826b0e368c0fb4a22caa32214d03c0fc891007af2dd39f010f7be08fd720ed88c9fc011c1e02b9461e3c9601eb2eb19706c83bc8f067608c85f8d2c77d3954a4f2a442b992171f63e559e2df62e059852abe332b23c4e5b471dbc048a7aeb5ca8afe5c1024e9d154f4118531e26b39c828354d647bb6920d7b9c9d9a47f959e37f129027a66"]}, 0x1674}, {&(0x7f0000003780)={0x1404, 0x14, 0x0, 0x70bd29, 0x25dfdbff, "", [@generic="5e9c279ec10ad6634e157a4987823786aaaa42f1c85c917d0c71a470d58309bf861ec27e6097f6c9ed38213a03bd7e490c6dd8852ac03a7d01de6c17e19aaa0cfe8017312cb502937bb4c0ff1ffc9f6b45168a08704c74b530d3bffe822e1c0a4b7c2370112542d610285b42fa13b803f9252f7be8569f9c1cf666a957adae35a0bd4f57121bf22f2bfba0c07fdee64ba52b59fffecb45b9032bfbb38006b4eebb41dcffdbda1cf83c2b4bebda315d5569055b8ea989d2c3d74339f96eb8ec3d69779ed04038f7e65ee7d2982df4b8ca382964eb7bad7d0af1655951aca3", @typed={0x1004, 0x5a, 0x0, 0x0, @binary="0ebed3fa3a2837513f883059ca67b758bf8af06035e96f9aedd7386255b9a4c76f40cf1d1ea9f0302104dfbaa455c4baa0002bc11a6caa15e80116877026be7935d2f42539e9a641ae07b4ee8414f39e38e6c061c2286af2bbecc399256672ccbd3a88d393e855d738c5d6e64c20828eb599f84525c5bef28f57310064b589897366b4aeec50e0157048f6fdb0df3c410313daae60566c92faec9e988c4467e400b8517fdf696cb786c8a8323ee73f40e42fe6307a6ec93742dd65145a1299d438e135a7bbf872cb89795a237ffff10451fbce42f2599f8bd0ffb1be5a0fd39fd439736096262e796f5dd83dab05beea8793a9efd4e45f990c2e4c9960692361d2dd0d3ba91236e8eee317ee16d9c3021452ea6c1cac1e75a6ddb52688cfff0a03a3bca39d8344b6b8a9dbc2dc41154c775402d16bbbbe3f713957fde058f1473df5d7737c838d81cfb2daba0706c4f66b5fd56e8b541f2f62f606001b907b7c52e9c01116f76b4a992ea4bab6052d39b0706829b1f1847d76f9d0ad4a9b35fcd73d1c30cbcf7000e358b3c27e71262dfa49e9bd6e736fa394d1e0ecc69e185e7b07d158f86dc3451825acd8168e22d4fce153fc8bdeea84e8b37dabc6ba9cff3f042b869cbf85533fb329dac98be659d2ba0f51b20774963b9b9f9df990284c464c0f8746eb7fcf07b956505a770539492ce7229637e47ed08178ca6cd6015eab0771903a7a0fb9980bf9915363941f1452e3c12a655313e7c9bd34e752040eedef8448c285b17a03506788ea5f133904725ca8e106fbe386f8e2d2a93a29e8e5a548bb9ca4e5232bede7d507d2bd4a98ea9973a19c13e36d46f41f33baf1d3b43e5a0f96c2a65eb79250d068d3e83b06434af6fa85925921d191fa735acd9c797f8e86d2a222a58155b375020f55d6fd03fe369d76e55802f9e023e93dea5cffee6e23a614b51daa49bf6401ba3d50443c689381635f7f31dbbfd13f895adf0e84b5e6e4e1b5224abe99c9cb484852983849504c5ab215ab70b48d8f52145abf8669fca2931ce5df3298507c36d22c6021fb70deb37e7abba652e294c25b06f29aabc78b03ef6b4679b4b7b2ab16e58e9237ecfe04b15296fe1f54a4ed37cd004afa9fba9d30dc8c42ec3d34d8575609bc3277a261118279b50fc297bdffe87378d3f3cf0f806b405f358dd86825b17b8e941d9ffc3ef1517787473e2b338f27a6264285d88501c785340af8f7bc05269eab76bbb5384d3c6db9d8a068deecdfc3e6e87a3f3c4a03fd946e3c89a744f17b51f94290e293ded95394cdf45693cbd5767bba2bf8b40bddb4e72aad3356bcd55dfa78c6441814b149dbf47d378f3a054d7f8bedadf8aed69676d76dc20b5077ad66d8685e2b1c1a6be4650145208fb5691520bc5b956e5e3332feb57f0ea3a944d7701136b1b7bf1e5fee94944e33317af3dda1f896a0687f6871b79658e8459637a57587d71ec3247a714eaa55eaba19d3ac8458f006bfd9e8df8a460988109cada62e346c772ce0e6ce5c249ea3194478622131183bcf0669399df748145a9a6a2bb38d51ecb92aa263d9c7d1b8ed1fcf97afb5d7fd4a08daabd34a48e20b6851a8d9eb6dcb84b91b5dfd05aaf5aae76dfc6d2f3c9da3f5a338b3a1e25f3b6cc7ef7522c342e6d03da965728cea3a37ee9e27b40d80c6af5b678a3fee7e64481817ce0f65fa00fce8a21b80e89416e4f4bd1f24fbab6581b1aeddb83dd285fb47051e46cfca3fd109d1a40a3b8bdefe8008fa0ddf81d0906ef3bbd742238eec068b05155d8f4e811c6fe9117ffd11cdebec262fe1fa76241f192ce5d98a9cc5fb573d202a726039bff1cc97a5dc9d2c7b185b98d196b88df0c3baa1438e330b652e5e990361ba4d683bf4e40590f10d3e40c313139e107c5c1da08985c09e89222ce19becbf8eb29b2c94a3e9e2c021266d1a1ed4caa170dc4d7abf5564f0d91ed448024bd61c9facc7e3a14b93ddaa22efd9b578afb8c2eef3b5540f66272289cf0defa9f1ac658c60379c145b322f3bd76fe163227873a8a6cf16ee1b7e57d7eadc190585080eee869b1a6794a5a7cdf09dcfd6ea2f0bf4df5e21a686408da0a9f56c6068643e21198cca9801b96d758641684acc5fad0d9378e8fbb7dcd84011ea8eecb9d4655d62494ea3179a09a73183b9213a4336accaa23fce545b0c46b1303e44924452189c50bc1fdfd81b51e90536ce0008d6102cb3d7e81d8a0304e37687b4ec029cf3f108da30f9f7482b228af3076295ec4c1eba0388afd4c97d507774cad3bd706bf1b2efbcb63a9267c325773c543ef62452c2ed8b2e79f7c79cf4f13c98ef1ce22bf8d0a9107ec485a22d39080aaf057e370dec295b2f8a505023462da48f9f904b1853f729aaa085aa00262b79f7169f29577fb16ff69c5aee64c0ce1d4c1ad7826da1cfdc3a4def879fb316508ee2b9c1d0e3fd72fcf650a7db0a9b5ba44a69f2e50816516dad890dd83109045e0776d5bb6f29d36d815ceba905ab309d9c57720605d335efcb7668c5f80fb3682fcce8a138cd0860b3217540e8b321362bd8c74b8ad4e4394fc965d52ce9aa13f600f6558e8fa5db20216f2fd4000ed111a7b536ef62c61b0a0cfff15608857c718faec94bfebfe5fed33037e78356e4b25c35303a019a7dbfb5a380586f41f7dd8a97d68c7a597b35e9a4e44fea9c8efde8f0ea68c9295af40f2235c688f425e0df9ccc3c5edc1be4f2e43c309bc3581741731c137c1b686ecb146437e53e21ecbc31d49e1395b2cccc6646ede5b92b934234cd416271901c0a740c398b6f8d29675242c205bfb559223889ea8a33ef3aa99c631b77db1d1ee62a5c54b9531d923e1e47f56f3d74f67d97fd8223b66aea68ad72d0ca5c02a858cccc0d2723a346432689f421518dc6b55281ca7d17c156b5670209cd72b02ea4be4417d2e32c2b0b37e8f2111572d9f9bed136954ee835108dc0ed90481251a763d879a15fbcdfa51f9e32a73f9f5c1cf78dde10ddead9d3d9fd6d6399c88c3057ea5822c68c907cfe75fe8f5ca6c371e6e2c5eab393107adb54f66b5275cc1eeedab350f2729f2a9bc8d285542d5fd886a9e9b28b9019d2e877fd35562546067cd8439330afa435fc76a4c251e5e6be42882f0aa2ae8ddd6f2091544e281990f1de824224b050e50521596fdc6957b9fe6648d17b8b6f556022ebd284833bfb4f7291f539396e72b6898c77a7666e6f09708af849f2aedd57723f1e19ddf9a17dbd28fb1acc0a14bf2d243fc1f85d96bd8c9a2a743d7bc8b0c759d05c9f7c4d5406981b0bf97b18864a007bca6900d57fc8e072762d961ef040fe447fc3fbe7d2f0db3bf3555e0bcbfce9c1fdc96f3c506883a93efc1352ab257167960a15c4e1ef9c91780db6c27511ca75c34cea0171409e7a59f26557c8894ae2c8ac6f284712cc6ffeaa9406d06ae39c4672963c4ec3dbc122041954618b2b99a05f395ec9ddb16e2ffc20c79b3476bc1b54f9773e645b9977e20bd96536773e3f119b8a3f9af87002803825b4fb9aead08311bd7540c81ed0229840d06dea82cad1787aeec5ee3df75c6b0c229d81c8ee68762037800d554e517ae18eca06a8df153182d34055c81a35afe0b1f585d4d0e6a960e76ba3e227ad0f3ee1008f95d0de02d1a2f6180ab79ea5cd0a72cd1986b5c1b5d63f91cc0a46a2177ba2c2db99e84f2a31d482338f096cb465e6af3cb8764092e4541392a6ddbe0c7e9bc745c4a5213b095e90a74d843f39dba046c2f55cc06845ac6db353cfc21dc57ede3d26f1f0a946881281a784fd9d40ba9b5f54a2a52efa7ea81a5734ba21c6befa2bae9719f914c8643a7d01a939f393326a38fc7b31eba7ed8f5909d0f9c409970f85a784506297872126075f0a4f63c6d4e50382816c0485ac0412fa1379ab67ed5f9da200982891ba91704c3408a3f23faf2aa9ff23d87779cd102e548420d3d7ed346ef3f87b133e04f2877757338c588dc5d3740b024bf877a7131e01434ad3fdea779b3e6aadc7927793145f3b706cfe28970137ebc7949627f306f0f645519cc2b111276835ca0578b859a1081969420758599bbccccc253ee6c426a404c919b117be500d502e5fb0f27d39a2db893e213cdfc8a48804e5c94def003570a26271a9146fdec779accee74968c5faa9a727c6707226fa89af3da3eedd3efe1a22508a781ed6b99b6fb63f851eb07ff7f51ed46a629872a2379053555f64fbc8754ec15c208839659c0fcb460b8f7e5b5b70a9f6900012e0148b5f279499468f80542cc994387383569819ca7d5c47ae5ff5d9f1c373eab3bfabc5adbf343c929ee98873dcd547a776edd7ca88faddee2ce6acad5853148a2110ccecaecf72cc69294f130f03734e78b0ccc8199c2d1b570ea8ecdc07897ee92ab864814abd3b3d77a285c62628bef0023415a371bf33b913e2e89134bd831c80594723a7b1f87e73892c9af185e701d41f98baac79d5b0c311ff29f3ef77dc6eeed47ec938ab6741f3dfd5e1ae40a28a975862ce4ef7572426805400aad1bf4fe663eb2aa19492f652f844f45a8a931cf109d48d7bb69162e36ecd326860792dc2be21e6f6449d1759ddc9f23fc02777ca2ff5a527f02435b607088e3b8c355f2c90c5eacca54d4c1af07ea382b96511299fe22ff89b31268326473d52cab710bae0887888f64679efeeba27ae68b468e4b841f19e758f191a741ac964a0b046e79cd320096396b1370e44df753b91801b1b5074a357d0ecaabc1794b0786073c4457481898cb8fa0e40156dc21aef365ec10773896d65e676c65e3ea0f6cf1e56b9367648ad682807db64a572c276a3f7b17ab0ff3fbe52e8952ee6e9fc8e15f320db048077bf275f506ad6bb81ef70824e0fef3636d3fe422aca9c7544689691874ea81febb908354de98acbaf4a78a9876c0494e39bea50edb511c17fc979e018aed8569568a920337b1d60c7116babfc60fd6f3466d9f6228151f624897466cb6465478962ce4a25e5cf07e85a1da89456bf9373cc14bc8c17792d31f709ff06dee04a1aecbb9ea1fc01d8c281f796d990086f7d151ae451862dcae6f907be441d3cb914c351763bfc542f01af7b8cf22b527c65d33fa7c80f56c089c7f0a8afb4970324acfcb53ff48a170610793e42a2bc2fe98292ecd2b4002081c5b4e41df544062856ee59539ba5e516e4a6e8dfb31365749415d55f2f792f94d34290a680ec7d69680e65f798a23462ac5bdd0cbc091fd88567143b57f354a4aca7d40498cd2b73ae76840951f35b65469dac34f80edbd9ff9cf1c782a60ee730a4bfcd2f1dfd12572516eade3af8c254e8129ac428ae06587aa94a266b943d3500402ac598a8d77659b9cb03309299af21ccc999b35c9fae894e9f268fa1c638418094bff853256a1e0c01817103c04de812d3935997db7dcf2a6cd3656252f043b5b8bf864d0d946ef8ad43c6edf25dc337b3e9442dde497a587ec938e06560dc0c51ddf7f7c9b1ed30256b9210269bf0908adfad33354a2f23fd7c4755cf17cb59c7ba2ab276637180a6f96268d4eaaa6d250f94ba96417162741c0045955dcb43bc00bd76fb25cb231a3fa4b4c115ee5ee11a24444d5513ca7c8b491a95d570a0528e4695d8d394a82aa8190e44db0a68dc77223a905a243ce247f1e92a849d56e2ab40bb44010677556cf569858a28553a7d2f5dbc653fba45d1c83687d84708ee9e459f6e2eb8ca1320e2ec84adb84e4f1afccf7cd5b88483687874fb2f40a81b71b99e16"}, @generic="3feb3fe1c9ed9953dbef0fba0cc21242f1cc3a2e01c0aceaee00849e03a689342c73be9c3f16b52fbbb4e68b917aff3aea7767c48f9b1931ce8fad949f3d4ed0213b8209716211706bc4dd6e7a479e99c4072f9af76e6b29c71ff1e9d120fe550ad6c7aea4ead029a7c79047c307d3c44861dca8ee8a62c9a87ee7b8ac5fc84c01f511e9be6e0e7c234a3acc933371ff2e7cb2bd9e12781d48f04a0b52bf07a34f2b0f14b2430ebe2f186abf665c2ac89bd3f8bf285e217e4a917fb478d8882d08ced16d7d0af510b54f59d765a6ce9b893cc71aced627fb98c5cacb3753e7052ae3e2b654c5f7be1d24d543f322077586", @typed={0x8, 0x4f, 0x0, 0x0, @uid}, @generic="929db299ab59de38d8708fffaff80b9766331526a5eafc0b0545b54cc8c6e95bf1477a2ee82a111e716273fec705ae5e06310e9f5694aa92d49998348d284e76d07c18fc33c5cdef97597c039d", @typed={0x9, 0x3f, 0x0, 0x0, @str='hash\x00'}, @nested={0x166, 0x76, 0x0, 0x1, [@typed={0xa, 0x96, 0x0, 0x0, @str='+6)&-\x00'}, @generic="377597a9b161d11d3b9c660645d5376af2ffc58125c96c42487dbfac5392206d08cf065d7267f669db6d6dc1349289eb6660bf929d857e66e438f2db148c02", @typed={0x9, 0x15, 0x0, 0x0, @str='hash\x00'}, @typed={0x8, 0x7a, 0x0, 0x0, @u32=0x1000}, @generic="48c29c029a00548308e20b8d97f0b97e6d9b3c15b962a4945f340857d6c9a22f3d0ac761ee6259efbe21e1e49194a329ef174f47bd6399e5392c286853cc73cf6b76b33392dd8dbe3b670b88c91fff4541090cfea21e1ac14de1017edbdcea9323bf0d1f8d03da414fffe1ed8c7960ef345db60ddbd63b45f037843655a690efac823ea96f9340f1021b75b6038ae3f2c1dfd9b1d4", @generic="931d942cd21dc7c804f541b8391d6ab4af75099d1e5586987d8546b8e5336a43804d0cd1ca2344b2b291988a89556463b1b4a687cc447cf18e072410343a169b53ab961589c5da4df23a2507f47a2d6cf147019a5afb44af40f1", @typed={0xc, 0x4b, 0x0, 0x0, @u64=0x1}, @typed={0x8, 0x28, 0x0, 0x0, @fd=r1}]}, @typed={0x1e, 0x2c, 0x0, 0x0, @str='cryptd(crct10dif-generic)\x00'}, @generic="cdf280b253e8557d1a08c537d02fc0cfd6fab3319634eb6b09d0bdb3d883857d67", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@mcast1}]}, 0x1404}, {&(0x7f0000004d40)={0x11bc, 0x12, 0x20, 0x70bd2b, 0x25dfdbfb, "", [@nested={0x11aa, 0x3d, 0x0, 0x1, [@generic="6ad6ea3efbceeb6a6acc35d9a88d43ef24e008b7eb7666fd7eb8cb1cd3fd4b1347645e60417b9a5ee0bd1e5caf871551d152f7ddfeebda193751ba5d4b75dd1262360873dbb2a3a7ad0db4ae6b33f29c7997d2ee79b7acccbc5fd2971368cc0b4eb67dffc4c8cd52bf4ed053c0fbdcad1a8e8944c0d6a98d523b7b25d89b", @typed={0xb2, 0x65, 0x0, 0x0, @binary="77e5ca426b52a445f8215ad67d0102fb5badd9542312ef7434d8d5cd2fed1681992a025c67180605e55cc7dfeb37a6afe094fa35c9d5f953c31f3d714f685dae1b411077aeab7950b6cd71af06b3df6dbf5517de6bf79cc58ec0bd19661dcf8ea35e38f53b63000bb1c1fd3b9efe74b731fc724e34169e71c35ede082e690223985a53f2174f0f17666321b7dd3938ac8ddb1f217de21b70c3743f86fdc3fad528d1a06a2e09b23f62c056774973"}, @typed={0x14, 0x67, 0x0, 0x0, @ipv6=@mcast2}, @generic="b44da8273ff8110749379cb936ec14a285dc6b99ee632fbb36b0ae21b170c53c32a2a9499a93f19beb1a8753c6957834fa18ce3dfe4d5ef5ff14eab9006b9080c6a6d873d801bb0962059f632b47016e", @typed={0x8, 0x24, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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", @typed={0x8, 0x90, 0x0, 0x0, @fd}]}]}, 0x11bc}, {&(0x7f0000005f00)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="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"], 0x14ac}, {&(0x7f0000000380)={0x2b4, 0x1b, 0x100, 0x70bd2c, 0x25dfdbff, "", [@generic="e50e32b178ab20856729897d53c9d36009c8e21b46b0ce44264273403f398c4c92fde04a9c177b28e2433c0b17935b5a7cd9d4181607e03c53659aa9897a67dd6b6e62cb0dfe87867b913d9506f0fc486789b4d23968ebb98379b3b03f2a3e70968417b5b8f32aff30d2fcbfe64af47e4e2cfa64a571a3ccaf789a097b3c7e714ec61ddec31326824ed0f9daa2ed4f4c3920ca23fd389c", @nested={0x20b, 0x79, 0x0, 0x1, [@typed={0x8, 0x67, 0x0, 0x0, @uid=r9}, @generic="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", @typed={0x14, 0x16, 0x0, 0x0, @ipv6=@remote}, @typed={0x1e, 0x90, 0x0, 0x0, @str='cryptd(crct10dif-generic)\x00'}, @typed={0x9, 0x24, 0x0, 0x0, @str='hash\x00'}, @typed={0x14, 0x8f, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x1e}}, @generic="f51265adf184c35493a02e69d64ffc07b1df497574de06247970c6d8b94f9f9948a0d5d490134c66581719b12a22c047d0563c7f06c50ffba831fc503fa2d8383fdfb1c56396ec895048cd1265ecb00178a784e7ba4bc382590c7c151e28b03bddaf4ecb695b2b3f997f7a508af18c40772c0a7e2965471bb541687300e406847d008d1aad2d2ce323f8e0a2c22cf7042d15d24a77e27bedd5428909452f90b9b6a58335", @typed={0x8, 0x0, 0x0, 0x0, @u32=0x9}]}]}, 0x2b4}], 0x7, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r10, r13}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x40, 0x4008000}, 0x4885) recvmmsg(0xffffffffffffffff, &(0x7f0000004d00)=[{{&(0x7f0000000300), 0x80, 0x0, 0x0, &(0x7f0000000780)=""/233, 0xe9}}], 0x1, 0x0, 0x0) 01:17:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:15 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x50020000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:15 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x7000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:15 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x50030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:15 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x8000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0x20000014}) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) epoll_wait(r2, &(0x7f0000000400)=[{}], 0x1, 0x2) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x10, 0xb00}, {r2, 0x4b57, 0x64}], 0x10, 0x0, 0x0, 0x1473bf3) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000380)=[0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000700)=[{}], 0x8, 0x0, 0x0, &(0x7f00000008c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f00000003c0)={'erspan0\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r6]}) write$binfmt_script(r5, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r5, 0x0) r8 = bpf$ITER_CREATE(0x21, 0x0, 0x0) setsockopt$netrom_NETROM_T2(r8, 0x103, 0x2, &(0x7f0000000440)=0x8, 0x4) ioctl$NS_GET_OWNER_UID(r8, 0xb704, &(0x7f0000000480)=0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000dc0)=[{{&(0x7f0000000440)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000500)="52a3e040322925e3eaa8c45ba5af", 0xe}], 0x1, &(0x7f0000000600)=[@rights={{0x2c, 0x1, 0x1, [r5, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r7]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}], 0x70, 0x4}}, {{&(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000840)=[{&(0x7f0000000740)}, {&(0x7f00000007c0)="654db26cdbffdd999872a40d6b9650d147281b175cbde7fa30efcee358c0f305a557b39cf65c7d222f6e72fb23e59881795e00589b635717d8acc08c6a90affcb952be2437ff45803261b4d38e669f13592714b46bd3d79cb699b0f7851136fca7ab8b18d8cc186f8f9429064beb27dba125d2aeec3a5a", 0x77}, {0x0}], 0x3, &(0x7f0000000c80)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [r2, r7, r2, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r4, 0xffffffffffffffff, r2, 0xffffffffffffffff, r4, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r9, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}], 0xf8, 0x20051}}], 0x2, 0x40000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) r11 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r11, &(0x7f0000000040)={0x1f, 0xffff, 0x3}, 0x6) r12 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) write$binfmt_misc(r11, &(0x7f0000000200)=ANY=[@ANYBLOB="1700030007", @ANYRES16=r13], 0xd) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000080)=@kern={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)=[{&(0x7f0000000880)={0x55c, 0x3e, 0x4, 0x70bd2d, 0x25dfdbfd, "", [@generic="7caaae5f05fdd05023dc9d6035a7f2d985d719843250f89968b14ade3ccb7c2c06785199efdea9d3dd5d82eef4475387c44b0c9a90e2aca3abc0abca96241a2c76d578c812ff8110a18973460b7d33af582e8297fd206e8533e0b184dc7916c112ba3c2f9238ea0e1455a4eb033c0556120316fc51bbbd693c26a8b1258a6ff0f068fb16b9c9afd8f5101c500a50d533689331b9a6832eb0aaee727c", @typed={0x8, 0x7a, 0x0, 0x0, @u32=0x3f}, @generic="9b1e0ac65440ddccb0937b702e72a1697e59528215fcfae082355ecc3d44d2b23781497b2200b66256e8249e66accdb63cb0519492236c0f8b50d98766d2def1acf6ca6b0ab0fd45bca5c09dec8002cff16d3ec2b6676baee882453d78dbde80c2ef61dd3fc6e276071210ee47e04f4617acaece353ca63bbfa6240fc2c7bdda336c36d48084212de87f568adb3326ae890cf37cbd8a9b1f173e8803d31620f5c616b2448da46eb2", @nested={0x10c, 0x62, 0x0, 0x1, [@typed={0x4, 0x60}, @typed={0x8, 0xc, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="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"]}, @nested={0x31, 0x4, 0x0, 0x1, [@typed={0x8, 0x67, 0x0, 0x0, @fd}, @typed={0x8, 0x63, 0x0, 0x0, @ipv4=@empty}, @generic="cd562f53ae1b08214144e05ae777201cdb", @typed={0x4, 0x3a}, @typed={0x8, 0x36, 0x0, 0x0, @ipv4=@local}]}, @typed={0x8, 0x8d, 0x0, 0x0, @ipv4=@empty}, @nested={0xe0, 0xa, 0x0, 0x1, [@generic="d9317d13e21233e11e45c82cf8a44fe07b1eccbd1218cf46f3e18ec127b501eea5d699cd03809813f5b54c0eb00144a16f1e2dd1839f204c7594ba347bda8788c95c56b2c8a4cabc6814380d528271e2b8312242d20c2e26e75bc07d6a9b63a236dbdda1b0d1e84f39a9992bc3ddc4418a667276e0df97cd32bb61758c0153b57e25d4fda49f8fcc75fea16de088b703ff4a91329f016a4a", @generic="796f3a43b0d9f4cd13b3346c734b80954e83857f5c707a831b13f8aaa37a871d8b6fea168e10e5681bc1a3487a48053223f8ab5b801bd40d6a90103f09f5cee5b1e72cb6"]}, @generic="f8a121273e03e52ff62410c2b1dca82f7cd654f5de887b315810fdf641011578419273274b87821b6401fe6d8dc9ecabe26a77b45c524ea2de7e5ac3a69db75ffa6887df0a7f9e1d36817031925d86633cf24f44fd4deac1e77cda11278dcbf8fb45e6159e2266066d308a553250f769d074e5701801dfc35bcdd10f6faa7ff5f266c30b0d646cb804005c6f534ce3c99555fd31c90047ed5050e78ed9b3b3caef1059d52fb5f281f3caf9a9da045429fa5ad64d46a1d24a301d7d16b5cbc4d95e17e7196d1b147207c02049beffde5e15ed123d85d634500ea87a20fdd91d75684e88852d25bd00e5", @generic="0677f7bc4638f8d59e390c0cc56effd68ecdeac618e52a733bd2e9201781893bfb9c53338210fa09ecb695e8cddc0474c7864c4fffdf3e7cb937c04c32c488b40edf46568a0ee8a27bfaa28a3da646dfc775410dc8be3cd149ad1a114857914fb5e67247ede5f345ce3521c67697089ddebb0c1baa9bee7466f54c838ad7c12058d50d85707e3b81122f434393050abcd34633099db1932b3944fa83123b49f0dc2dbd98c53859a499cf8b22b9f2a63209204f6462a94bb37ed8b04832f2bf05bbaa3752ea3b86ed906430cc097c9456008cccf8f3b6c3ea8554f355bb13d5af39f79ed00885ff43daeb86afd5"]}, 0x55c}, {&(0x7f0000000e00)={0x12d8, 0x2a, 0x2, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x7f, 0x0, 0x0, @uid=0xee01}, @nested={0x11f4, 0x7b, 0x0, 0x1, [@generic="82d3b8b5422463c85b7d080f4f87a0f55c7a9f3b3a1a672a4c7ff8e29a44faa25ac59944a6aa62c1d46d1c29a1ea9f0457edd49ef24ee6bdc11aec3206524cd1b30ab6fb9446c7e427fac506cf6ae90e0d3249b46418eb875ab97986eb88f2fe90cc", @generic="a49487cd03216e4e4f18e3a58709944ba84491739786bff216741466f07e87e7d8016cffef8e", @generic="004d17642438edc2a32923388f90838c56b1ed4800689998c50d03e79386a33398d0502410f66b9dfd94d2c7a7f7f69d6cd926dbeb65174f238d23455ab9ed9036cb900ca747a48ab0321949470a2945064497f0bc1e9feb63fcde0c94463da80d670bb0f9d924a5894d45fb81152c15f22160f4984a564ab241e023152d9acb04187cf0efcd274ae48311197de66d6575b333e251d38b49c2e24a495815580392822887ea57458c4dbaaedae514e5e72297d9f626e1abb8", @generic="4fe7d7f81e377745efdda01bacc8501f2297183a527ae318f9e9de9c32f4effc2140c5d5ea68307b4a03bc2e59681c3bdce268c4d85e01852181ac1f884e8a713a0dc7cdbad4b0e6af9d9898302f93bcb4d500db7a9df492e69945ff6459acc701f49cab2e274426543d4ceb246f862d5cbda10c13b1d35262545439fea30750a50edb01934f00045f1fe5e82a8b6c7dff721751b2c9906f2adc326a5d7c5664236a976e8cef51f715c96d67d1dd23029ab6cb9928e393559b1529a62d211ea445884e0d20ccb50be6498c9f125d88f0191bb3fea250035c57dc757dfdf4db7f39782d97b4ca9c6f0a93ebe6a099f5c2ddbd1111663813c60f2a9d1699276e3870de00ac30f9d08e500240766f812a2ffc1054c42980ba4afea41fc47e7423ce2731e6a0da48d65eb73523f9045c406ef404da09cf8dc2f5158faa67901b3d8a5806845263ddb6ee5abf74fb064610a55e6d131a1a8c87bb9caa32df6014578e81bba56ac489aa26db9afe5deaebb4664088e0249d2db811223564f180ab3c8a4fca0bf024f6575a5cf79ffd7d90169fd66500f175a7b5f083e707beea978a5c0c9300d051ffe1f59463c9f40d87a08ff4b3ee24c43edc99f77d63052cdee10a95205aff31f834b8659181c6a3c1f3e64b3d7eec7af9f290f74b61dbc29f80cd4ad20844356ee010039e80ff2d2f0d25c744a2739df9628d2b2832d64a9c78025623fbba1fce44c4c0e94f42a0e66c6aba860b169e515ac4269b598b29b1624e4429ab1fc842fdab3acbcc69a902863d4b0e9f4c168d7bb8af8bc16cbbe6a68ac7095ddd9c52b54ae06cd437b44bc9186f6dec6b74fbb7ac153c6b2db8ebda5f8d3665325291d277983dc5dea8b03479259af5f7e5a8a1a410ba363051dae7d5a6065eca8ccea80214df63bd5a9ce7196cb78fe44f257c78dc0917284c080151ac9e32bac5258d648e1b7f38ee7d533e320c6f7a6d4591c88fd9632d4eba4fa284905e1c4c096431d744698774b30c3dc8362d6db0044b960dbacb7f69aa1299f4263e113b7bfe52b0dc338b662f1d80406223ba0dc5dd0bec3608de7c849331905fb22e62eef17756989004b46d9e12b922bc239db323dfdaea8f7c64bf8bb2f308942be2545d400db23a6be9b2a17b69f7284d6fcb9e5487af48ca5e8582bfb578a65417b2fc854c9b716106b1a98347d81bc416af19c4747e836e5f23843af670191d65448907af56b3daafe31ad670e1fa8fb20cdcd01cb8024452cc7f5cab0c3acf3fbb0658d934b33b8c9249dcd9800f2d574ec3bd91bf47f4d89727401ff009f2c10514d73850041d6e5cae60bec0b84c474de12a0fc1fadf4c450cd4f9d7773403176c6d628d374e1902208f2a64b4fc49041a87663b35e933b13d5b08d4275163085ea88eadb7490f8049e9fef417b4b9f06c8139b89b1d22f18b2913403275baefbb726fb52a16651d1388e47f83776c3f88e8f5b99dbde2957834331321ed1cd26c89715bb0323e58a5d6ef71f40e25d5e5548b6e8efd0b6980ec4e723c5dbc50dba2f207af75f96bab4a0457eb434d793f27ae7f72bbfe7eb3ffa742923a925a74d9aec3c02354cc8d3ec00187b86fbf09b0a308e1dc8b11315f001b00c2d2afb7169ce822ac47d909ca6a4a59505dbb74b6e39aa06f22331c10e5365eab800c98a42a66f7fc40a2b096ae0b5c7eed79b22a13a47dbd0948bc3b9624f20ade19c47968d59fa29081bf316eefcf5cdca4bc7d2899bd892800d8c696882f41caf2072f66caf98f861bcaaa1397b87777e0813ab1a5d6035111d1f68831afddda4755fb9db9f08a9b752fbd3683bb9fbb4cb74a4bd2e279d0b5bf9818439bd081d0705f2c5f411170efd3406b6080d2f1686879433dda1add51f199fd2e83308a24289631befaf42c28eac04e722d4a239a5cc7d8fbe62cfa8d9c3ba9b7864d323ef196bf3f8326299c916c22636630edb63a4ec33d4024e3e07e8046542d6a0dcc001763de74ca8e2d8d9b5728696f8e70043fc6e4b28031c999bf43109e70035941c15255fca720cbb764e800fb745b9ad10d23add4571fc5dda706c828c2c377806180c67e2da0231f2c1c90b3a517bbeae0326a19f26e10dd6a3ea9be0f17e3fd95b1dbd44a1b71ddb147a5b6868f8eb099efadbfd227ae5cea9b1d8a7a7d8bb7ba8bb6c24460ff718fb7407df62abb7264bc97983dd0a74a2995adb7beb728b91ad88321fc7cf144eafdcd3fe5d49b57d69b614974c2ae4bdc1493b2e4db5010f726fb86ea9b273aef8d15e23d20f6a6614ecddc1ce6b852fe0180e7e739de0ccb7d03114c490e1581ba2d2ff28cbb27e6505cfc66bca1d1c47f43518202593faca974707f7d88b66ef23b63533ff2208b85f1db7f340e19db0d938525c06913f647755aacecdd139d172f54ecea4381f040c411fa25d4cb5ea77b3b8dcfcf747fd1e3d12923ad039da98e809782cc27246a62a30a3ed28320471d538555cfd186c9541661cb77db48b597fa1cca8c9ae130524af67d3882c2e8a55137932833daffe6a90075d7440af6f79b78f32fb5ca5e0973cb8d1c3b08b3aa4b5c10ef34db3a5b3a29be8fd9b9196409946374a5e2b3950c49fc54b8da722c0e0ad7dccabea194f1d08f8c585e74cd0a29c45c8bc29cfcffd8fc6c1ec2203df2bc8576f1431a3f57779215758881bd20a333f129579e607de20109a62ec456fdb0c2fc1a5446916e6c5590e23c25001643ea6bd383e9848f4dd06e21b39c766bed776788524a80e608a71fcf684d3bdda8bf1c31ebf12da2543a8918bd549d7d872bdbd9402fc3eb3a97b741edc20dac29430a1d38bd1108b409a22e4af2d6f88e6482e38a02de2d3238cb6dda48b18de1f6590e986a7bd4482a64361e585408fe750b4dec372df96bc2349c6bc3e41aacd164355688d43ec9c5527e4bd21fba5eef74913691dd3614efad485798674f6317facf6645534da8399cfa1862d7742178610a57bd88e027bbd906ff8029b29e988875ba6b6167187eec76f47bff4887b57c1717785e415fd86efcd5039e331d77f8dbaddbb37d271fdd3f0b36397bd8cced0b01dbbf5cf9d446f3a4fb043cd24b1ad3b6b58f05301ba06cf7cfd8e4f193fb62fa7e706e2a740b5dafc97fb38ce41dc9d71f279dccc1fa1dd1e835221687cbe8afef0379eb62500ad3eb838f0a4252c2299d2b29a8dc687bc0311390af8383b7c7ad2d91853dc011208555293780850e697cdd5d624151a67b6dced64d4b0950560ec528c1253e024e4ead40f241f6fb8db148271f3f8d9243e6ff71ea7c45e4063a5afd6176c9ef27d953b73c2b1798fc9934e875e672cd9074ececa533e98199bb5cb4192014e4b0af5df33ead12433ba9087f5d603d9cefa5d26046c6cc6274a11561dcefc2f66dec16773cb76b477620ec2acf7b1376af7f4ffa440cacd3150915dd3bb7f896586f3fcddf4d71cfbf97e709594e8c2065d00a0e13ae16d8754ba75f95bd73fee1c5d902a94e1fbdfff77e486a9792cd7eecbb3b3903d661e317769e2fe236829e8e09d85608b023860f6ce67af5097ecf2ae93352075da609ba0b987f38bea4a1c147567b1b5706a14b3c7a61f45e74ae96f143a19f09d758ea62e6058111b9f4b64a7796697df54183b019624a3efc56ebcb356bce1b372b519d83bed6807a55519328b5f59a7da118420f0704a413e1fed1e11bbe0fa29bdac6672040544d164101cde3fe4281eb1590a5df7e57333d04b85b694afbff7a68a2734191fca860d3c07f31aafc22eb49dfde272e6e0ec98ca67567b149a2d85357001a7cc46b0e17cfb3113edc13196957be16d7b110f930e460454057c88d47770fc533558ca18f83a8a79c23d144d6b2bfde8134687ae00e61b7256536365e38dd20d89368d11d20d8b331de843c97949ebe0c2242b8d80ae2a44314b2fe466b66bac0e8ad7ad366bb7f6dda135c98c03cb31fa5b57379a539ea767e518511b967ef6d520e3d2d4a7e27bf68e1f67f872ea7ff9ee2a229d961fe61522ce445fd9c7cb25412e7da7bd577be9144d5567b455f265241ac68e243ac38ad612acea9c84cc715c59937280962a0cc791f783828a872e7cfbae4184f19ec4e988fb13d51cb1e80a582ea45ab9d604689b0c38fc1b3ce24408f5f45abfb768f035d45464055f01e95e81c43e2a17f4a453b0d3ccce78d4a55e0fb0374e6fabf75ce761d71de2bbc61c05624220e5884927295c6d56f02cf453273efc96f73fe987259388eaea078a15491574b18236cdb5722880859334f43e8201764e46004f38d5274d055b6a37ab1f8a5ea2f1613d349e550c4b446e14e7e85e27a6a9645505e03f856f9271e867a4d7b4e870a347d48045924fe823ad0faf8698381fd214cf86c1eb611de823d71ac022f6aae85d93b502b78918631233cd00ecdddd4649affe1effa7e1dcbf302f3bf5d5e033f4eac67490bbcab3bc35c8b7acaa96b772563815f3eaab92cdb86055baeb996e2901c40cb9f9b0a1bd7914d1fb079b89871da4d464e9834497a912388faa196f4311c9f544e45f9030094bafe5ea1b022e52002745d0c3bda6097e1c9e773287bab8a5e1bfdef365ff96678b28e6d0957fefa140907666cab3019f3f320746c96e9e151385fbd1caf412dfa06bffc61c5452faf23a3841d9e5d5ab7d429a3c0731d5ce5108ba807c79cab9659eb2b87dfa11ac1f515f80ad383dd012d89168e67892610c2d6d82d8f986689ae3374ed416adb81e179fd91ea0ced1bd11db45f825de38c0adcc333203b157c8fa7737e61831fa7b6e5397a33abf7a38c8e3ab7e8c133c01da31a23d33f6da82daad4dd54c56066ce38780eb979f1a609a289114c6da5eab0073d489cce055f675a100bc3c6d51add4852f01d02b10c23976e0bfc6dc85693a674ea76f5e2736634334ef71e00c568a0165bbf9d38bdc360ff6d2a415e592a1dcff40a9445af31e2d4c1c10b5dc7afe71c70dbe1e3ab234feeb39308c189d6bdd68bac3b8f5e9fef97036ff32f28928d50dcb2975e70dda83e47a700526c7c0b30cf737e595e2bba23633641947a56eeb6646988f3d0b86844af195137e1966417c75006f7cdca9dfd1526d9e35e9f717751cee42abed4c656e0c8998d64893aad4cd5d22d057fb57db95310af585c609366aed233bb66bfbe8751ab696f6b6b2c1bc8b130d91df724800847c42b1616ca39aa4e8ce9f7b4b4085a9dc9b98bcdbbb3dfb4715a2a8aa0aa5e44dac3a1c1e5bf860d7b078ed10995e4fe1701926ece83135ad3bfd9006cd3a5fc4fb85011c440de79e8a2d1c538729da48649d1254b521e1b28b2876ccc76938dc2be97d5d6fbcf909aa05eea79b652de4c28674bf237476c2f035c9d0887256d5508d86ef11f053e5e175940858b358b938377d78654dd47515ccf7e59612dc702c7c989460a2f0a6022459ee39f0ec0a0af784624165dcf01a65e25719cad146640e9fdd0c3f769f9eaed3f0994ff082b1cbe5d8d2792fbde307dd0281b25f848b0070e584caa2f8a012e2276f0d7aff5bfe304675b0359688da791469e286c6c5f846376009ea6b35e6234858c0a2e578702ef435ad211d73b1c6ba1f572361faa33885fa6c0cdcf4277dfea220842d1e5a065f406fb9b890aaf02506a1904a5cde7cce9022e0bfd604d14b85594d8bc6c5b6b35977f4c21164ca6a28c37fd0a54824a3404cb10c23155117e18e4387772c5d41d72cad4f002fb6ff53c7c28f82970b93b0f3af978529bcba805f5edc4e9ae4c596714e8b2", @generic="8f7caa3551fc248d3246f1150415bcceec83a28c202de4997d519f74ba91041960a5ab6c88509794b600f8417a24f54dd905a46f9e3cfdbf897cfe87c898d9854378882e31bda90f3940bef06bbcd9bc18cf1c7864c4bb37ddcbcb038db6bc5285ac326b2a4cae9a69d0e3f62a21f5eb4060ef5f4d03c39c2bc60696737efb6049ac66ed8df7f87940113efc", @typed={0x8, 0x4d, 0x0, 0x0, @fd}, @typed={0x8, 0x70, 0x0, 0x0, @pid}, @typed={0x8, 0x58, 0x0, 0x0, @ipv4=@private=0xa010100}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x12}]}, @generic="b2e304c9b9849362a58ad853d7e2af4da8c433597c94c44e9cf4033e2433ab5d226998ee3ce9069113c278941eb34396fc200c8fe062e5ff849722ba34223c9b18f049a9c9065afd34ff99326a429c190bd28d53980d7d4732059db139c3025d726895f924c0a8e80bbf4267b36da7795c20c7edd77d829dc8a0bbbae985f26b06b62e60e28f5a963a9aadd4ebef4fe47bca8a1a8196e23c8823cfe9a98e0e27cbcdc14e90fa032b8d3a5a1341ac26bb4f22924456fd9a9a09fb93439f6113e3c96c2dd52256a396427933"]}, 0x12d8}, {&(0x7f0000002100)={0x1674, 0x25, 0x100, 0x70bd2d, 0x25dfdbff, "", [@nested={0x1287, 0x86, 0x0, 0x1, [@typed={0xc, 0x60, 0x0, 0x0, @u64=0x100000000}, @generic="e7069b58a21f7278ed2493341cd0d232898794a7fb432f39931809a6ed646231a3b4844448582158cc04c0b20acb943e64fe28299afc47f6f0932c04badc3463fcb42195e9f2a3eb5930325ceeee2abf5c3bf4a07fe24b656108e6c2917234224d9128ac194a85bc7f8a91a9841094b58281cd663f7c2eca3b9def08f716f50ae0e195d89bdc609296b11db02f6228a78b5a39fa8e8beecc2e1862c2885c80b191fafed501ae350b4ce5", @typed={0x8, 0x86, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x37}}, @typed={0xc, 0x13, 0x0, 0x0, @u64=0x19}, @generic="2424badf0e23bf3bdd4ff1d94a333d9df69648181a454cc2da85e44c8651552c4a1707476b8b276218a276459dd2ecbfbbab7ed515b2c1c14d7f5d24cc47b058964b49ee62b524a75d1ad2dd7f53eee11448797e5b80844fb91d3d91434a66918a677517117f5070936c54f2cc6ad40ce31d922b71635d954b2c821aeaaa86fd8a95bcc1529b267cfbe540f2b7e443f09d9a2b5835224711558f87c5ccb0b612dfc4a01c89aaef2be7b3131dffd09e8812e129b7114d7d7f33ec2804a5d56d", @typed={0x14, 0x70, 0x0, 0x0, @ipv6=@remote}, @generic="e6576dfa27bd590fcb326e9516b019bf0f4130db9f5f6fce4f42bd0a79206caed1eb07c3e9b4bb3f7bebcf9c57bec443923f55157b751f572888eef068ce5a2d90555ebe68b4f9130e1f581a7bf4ccc91fda7fba1701c4d45be9a652a69b164b5857d851625bac384d1d68c50889f3cf875ac4a71119b413d4a516eb8bfaee9d53efd8c57dba953313a08df61a2607cbba102f2aa760d63e45822cf510da30e1378fa7bcb23fd5ff4d53e4a3af88", @generic="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", @generic="9696d5909335cc5c90399bd38a277435ee44b6fff7057e5e100b1993dc5921c29f86b904ab4427c52c59b6c0579895d0", @typed={0x8, 0x60, 0x0, 0x0, @uid}]}, @nested={0x1ba, 0x70, 0x0, 0x1, [@generic="59bb0af9fd19b2d242f5d8c50d6a8a81db188c05f6591de3355776e68a0424df634a89159f3681fb6a6ae56258acdcceb6d2afb206df425eca02b30f9c979fae11857581e2534a606eec505473d366905d6b64b7bad1b35da8571104eb2d10a23afd46ce63351238cfc9f709d96c0ea9d29591d7246c26fc7bef3d4cb8b393fcabb2eef7c2e9b9cfe06f852c5278945e6b1bdb8c54f2a45981217bae4d", @typed={0x8, 0x29, 0x0, 0x0, @uid}, @generic="b039630bf1cd89575a6c7cba41290ff0bcac9702eac1b2364f", @typed={0xf7, 0x80, 0x0, 0x0, @binary="33bc85242101b5d7c595541ee0e9c8cd60abd6c9928427447b50fac5618386f35344190906c70bdd5cfcc7f1d07db2f3cc17bfc8fa8ee94680cc023f13324c24597dc824cb58f2785f91af47b7d3ca8dda373ed2bfe497411f525ed22e087f65e3cd7a7fdaf51c7ca9a34a2142d034cc765679c4e41cc02ca5bac7ed65b7b12163395718ba5b2a761bd5d4a5b7513a486d1f942ee71d3a7dc75f8a30758df3c28db7110cf98b4f9a21c73c4716e4ad0c3d6f9376dc2d1a1d2018c94f6581d2ebb34e8b1a7fc08109f68465d3f6166456a166b9b9169f1f485e02b114ca562f98bec125a5b8ae7a9ad019d45f30ed655edfc509"}]}, @generic="3e618184ef444f8e68eef430d01734db5292c8eaebb46c7170dd639cba092806e595bfcf6feb550317cdcb39a050d74803e5ccc5e01b633cb17257bfb0ea356c79bba98e0b7659c80d9fa005de2d754899e396389f61c988e78e6b45637ad363d49b3829e5591db27c874cb957e1c6ad3443c3845f471a5ce932b8ecc734e01ed58ac5ffc49d1b01e49a5040e2421382f75fb5cad4367c4df0806995009cb0ed31bc4793655054eba5", @typed={0x8, 0x0, 0x0, 0x0, @pid}, @generic="0ff7c8ea8c4f9c3a952aeccab2bccf294ec5e664253514bc786ad434547086e1d037add03609ff0f10cb1b8a4c59013daf5b98ba65aaf791ef9cc287e7a87aeb6af00812d185dc41f8997e616b8b86e2399735236a3dbe24bf1494416dc42e8350b6dfe7ba8f45358ded1e2ab1ffc5865e05aa20e54e133e6e652cf5cade", @generic="f83d48d8b7aea4ba971def1201d9f925292552ac79cd288f1740d358a0a7b62cbe34d6caf42585eb8a9c6630dbb798b44d9d6899d5bc22b036a4cbc70951a72731bb3616c978512023f50f15e98f25b09b887e91178366158fcde0d00ce58227b443840f489d5b47a5e2f8c826b0e368c0fb4a22caa32214d03c0fc891007af2dd39f010f7be08fd720ed88c9fc011c1e02b9461e3c9601eb2eb19706c83bc8f067608c85f8d2c77d3954a4f2a442b992171f63e559e2df62e059852abe332b23c4e5b471dbc048a7aeb5ca8afe5c1024e9d154f4118531e26b39c828354d647bb6920d7b9c9d9a47f959e37f129027a66"]}, 0x1674}, {&(0x7f0000003780)={0x1404, 0x14, 0x0, 0x70bd29, 0x25dfdbff, "", [@generic="5e9c279ec10ad6634e157a4987823786aaaa42f1c85c917d0c71a470d58309bf861ec27e6097f6c9ed38213a03bd7e490c6dd8852ac03a7d01de6c17e19aaa0cfe8017312cb502937bb4c0ff1ffc9f6b45168a08704c74b530d3bffe822e1c0a4b7c2370112542d610285b42fa13b803f9252f7be8569f9c1cf666a957adae35a0bd4f57121bf22f2bfba0c07fdee64ba52b59fffecb45b9032bfbb38006b4eebb41dcffdbda1cf83c2b4bebda315d5569055b8ea989d2c3d74339f96eb8ec3d69779ed04038f7e65ee7d2982df4b8ca382964eb7bad7d0af1655951aca3", @typed={0x1004, 0x5a, 0x0, 0x0, @binary="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"}, @generic="3feb3fe1c9ed9953dbef0fba0cc21242f1cc3a2e01c0aceaee00849e03a689342c73be9c3f16b52fbbb4e68b917aff3aea7767c48f9b1931ce8fad949f3d4ed0213b8209716211706bc4dd6e7a479e99c4072f9af76e6b29c71ff1e9d120fe550ad6c7aea4ead029a7c79047c307d3c44861dca8ee8a62c9a87ee7b8ac5fc84c01f511e9be6e0e7c234a3acc933371ff2e7cb2bd9e12781d48f04a0b52bf07a34f2b0f14b2430ebe2f186abf665c2ac89bd3f8bf285e217e4a917fb478d8882d08ced16d7d0af510b54f59d765a6ce9b893cc71aced627fb98c5cacb3753e7052ae3e2b654c5f7be1d24d543f322077586", @typed={0x8, 0x4f, 0x0, 0x0, @uid}, @generic="929db299ab59de38d8708fffaff80b9766331526a5eafc0b0545b54cc8c6e95bf1477a2ee82a111e716273fec705ae5e06310e9f5694aa92d49998348d284e76d07c18fc33c5cdef97597c039d", @typed={0x9, 0x3f, 0x0, 0x0, @str='hash\x00'}, @nested={0x166, 0x76, 0x0, 0x1, [@typed={0xa, 0x96, 0x0, 0x0, @str='+6)&-\x00'}, @generic="377597a9b161d11d3b9c660645d5376af2ffc58125c96c42487dbfac5392206d08cf065d7267f669db6d6dc1349289eb6660bf929d857e66e438f2db148c02", @typed={0x9, 0x15, 0x0, 0x0, @str='hash\x00'}, @typed={0x8, 0x7a, 0x0, 0x0, @u32=0x1000}, @generic="48c29c029a00548308e20b8d97f0b97e6d9b3c15b962a4945f340857d6c9a22f3d0ac761ee6259efbe21e1e49194a329ef174f47bd6399e5392c286853cc73cf6b76b33392dd8dbe3b670b88c91fff4541090cfea21e1ac14de1017edbdcea9323bf0d1f8d03da414fffe1ed8c7960ef345db60ddbd63b45f037843655a690efac823ea96f9340f1021b75b6038ae3f2c1dfd9b1d4", @generic="931d942cd21dc7c804f541b8391d6ab4af75099d1e5586987d8546b8e5336a43804d0cd1ca2344b2b291988a89556463b1b4a687cc447cf18e072410343a169b53ab961589c5da4df23a2507f47a2d6cf147019a5afb44af40f1", @typed={0xc, 0x4b, 0x0, 0x0, @u64=0x1}, @typed={0x8, 0x28, 0x0, 0x0, @fd=r1}]}, @typed={0x1e, 0x2c, 0x0, 0x0, @str='cryptd(crct10dif-generic)\x00'}, @generic="cdf280b253e8557d1a08c537d02fc0cfd6fab3319634eb6b09d0bdb3d883857d67", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@mcast1}]}, 0x1404}, {&(0x7f0000004d40)={0x11bc, 0x12, 0x20, 0x70bd2b, 0x25dfdbfb, "", [@nested={0x11aa, 0x3d, 0x0, 0x1, [@generic="6ad6ea3efbceeb6a6acc35d9a88d43ef24e008b7eb7666fd7eb8cb1cd3fd4b1347645e60417b9a5ee0bd1e5caf871551d152f7ddfeebda193751ba5d4b75dd1262360873dbb2a3a7ad0db4ae6b33f29c7997d2ee79b7acccbc5fd2971368cc0b4eb67dffc4c8cd52bf4ed053c0fbdcad1a8e8944c0d6a98d523b7b25d89b", @typed={0xb2, 0x65, 0x0, 0x0, @binary="77e5ca426b52a445f8215ad67d0102fb5badd9542312ef7434d8d5cd2fed1681992a025c67180605e55cc7dfeb37a6afe094fa35c9d5f953c31f3d714f685dae1b411077aeab7950b6cd71af06b3df6dbf5517de6bf79cc58ec0bd19661dcf8ea35e38f53b63000bb1c1fd3b9efe74b731fc724e34169e71c35ede082e690223985a53f2174f0f17666321b7dd3938ac8ddb1f217de21b70c3743f86fdc3fad528d1a06a2e09b23f62c056774973"}, @typed={0x14, 0x67, 0x0, 0x0, @ipv6=@mcast2}, @generic="b44da8273ff8110749379cb936ec14a285dc6b99ee632fbb36b0ae21b170c53c32a2a9499a93f19beb1a8753c6957834fa18ce3dfe4d5ef5ff14eab9006b9080c6a6d873d801bb0962059f632b47016e", @typed={0x8, 0x24, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="9a0b49619aa87ce050a6a11f7c89d30a4d0780b6c3239a789890bb57cf852258314cafd48419fe1ac153944020d376e3ee58fa2a04a932072fd3ac82c1f372beb366c965beca87f867f27a47eb16095680be04aa52b9b80639ee012b321d0b1051a35a92c9743739c0d670ded8707f0b713f28913f4e885d8b296bf294b55f654e96ec21dee8ef2b4254bc696f0b05b11d66d3bb24adf6dc7c6155aa3bf87cf41b433376b866857098aea4d7bb8a37e6220de37c71156d7662c42f04c766e5228564c92d39ee7ccbf4afbbd9849700098b162e507ba938e4024daaca064c0fac3cea28782c50ce48057649a3e3fdaf4c4e8ba562b76fb94dce5e399de8b67abd7d11984daafe2506a371ec7830cae8be2b63d99c21e878d0a04c834f390b1318ca24b10d08ff9fbf503423f6edc1101742708c70c235b3ac91a71dd7ac7378bcdc10b2d0a706ab2d63dcac00a6d3e3e7f28c3b9795ace0089291f5d6ae041d0e3bdd86e395895f67e7cde937f508165ed370e0cbe232d1e65501e7e88c83ead0c23eb0d798f22df51ce040495e8b5224f40f530688fbb87ecea18db1a4d20b1162de630f5a2321ad0e78d3a4df5197edb879213ca42168a808f20196ee0b9a4e4d862f9a59ab4d1a043ee35181a98255e6f9a4502afde851f4c64f25078d49406c4c6da599ef8a164ed163c3f61aee066b27637bf253d6e75d5ec7fef08b24ee446093ee9a5429f03ae300bf7953506821accccefd591fd67668ae1e1ad91383521dfec4b6a93b3e6518817d68084812662819b021f3b8a02be1b5ea9dc635e919fe7aee766299def492153d7e7b77d1a85dfe51231696b44dd0bdbf6a653a7ef33cedd53f118c31af34b17160820e6a16bb9349073001f8f8a225b8bc176048ab824565e5e04c9339ea4107bb0267d828bc68b581cbfa5dc8c963013cd049068abd7512d00ff3207149e878c7ae288cd06789b6c812295b9c0fa406c1ea62e890120cebb0dc5b287f79d0da076d170b8e75186ee8e208d9436f317706e10fd0ebd31a82381a282ba5b02fbe310d3e66a6400891538fcb0677a47c9fbc720e09499f9d1be278c46e9501368289287147fc28dc050308cb8cb469e8c7255f76d6cdebda06bd79241486324232b51be39f99806d7a6eee8d3e8c0fe288c977b484fc8ea04601f03cbe16758498e84c138374be61315e2fb0683c2d2ffdf4f939f4e241aaa84f481c39263948ee89522365e1ccd80ebeb8e22c7d3284ea7d749ad98ec7c89c49a7f0522c1c99137acd2ea3b837f3079b988cdd3a57c1ee7b34bf44e8da8c0fbc2cf95e3975c90ad520b83c92c5550abeb11886b26620967ce5bc6369564b1f40287a102986469a0ed849355971ddee1e82c2b02a66615c5ef13dd9493e4db16016d725ba84b88f03590503e03fd9a37ef198f7cc3262d4913c1ea1450a4f62b5753dda7f4b485cf05360c7836bdb423c4a21cc619798258e2377bfce2bc236b05122cfcb98ba6a71a7b45ccf713b0404a6ca19dad65849c0ff5b4fec06250669f804dc10f0d3d9a2b87e1fac600a939ad8d7991cdd7374230d3b57e407acfb868820ea4c3deda95045615aa0af10a8016f1f93a2d55762c79dd67582e0918eb7faf74745feafecf2c5860001a778ea9002471c33e20736dab0b748a13226696a3476817050954069f20668a1e62baf2652e1462ef735346f109eab78809a941c4be2c7ba63d881198b4fd21efda0524f422072b24f3f03b16f20f4b89fd6c2ce6a15fb9a6b6e1d5fc6ca6695b2f4ce7d5b73a0ee1d86f5604d5f90c15551aab272120941b5aa2a82b9c9ef08cfc11774ded0dae924510a46533cf0d990568b1e9873a04632729f93a52f0535e799ab18b92a663efc10c14b8078a02feaf4741f2cd170ca09948a57fe66028ff498789635ff7c818c8f8f4cb1c1c7bf4a7bec0b5e476c9b5360fc9d95553880c10cb0035114d45334051209c61b2e457ab5ce222683a5c6e4080d7eab3d6ff6f05bff7d4538845728877963a64a838fa2ee79daccc05d91b87aef83ed342b06026484991a9db3afa04e8a39a3e6e9a94c8f7bf8438b077f76e5bf8693758078508f584cff775ffa3e4d55f5b364de9ae799eaf940954d8f4c63bad1e012d82caca7715b5b4850535c5ae9511f0ab24022c1b0fb76b9ad16b8285c151989f2551660105ccbf8c470614c270f3e1d334653ee023feeeffa6030be60e38f889561b77f740de0489d07a78fd091d17e79448299fac1f0dfe4ebf78c131a518458e0098d7266b7249ea22cdd26c7769fac0ddf564dedd30f7ec7c9e880e2ac7845339a8cb8372c2ba8043478ee201454236342f8bd012621e06c0e9f77babd23eb9f817fba74ed405e7b1f2ec80dd9fa29751bf6c4f7812248742a012931e2c6f7e399358851b165dd3b042d9dfcbf451833b2feea0cb904e9f09c4a9fcf9bfd8698baf490ea17d62dddd7d9ad5d5c09f86009df47524446bd5eaa2a401b7bb4668612d22aec405cc82f96833d6a8828b30b521611a6d2ddb9a0e89dc3dc5787ac996cd2e802dcbde7a44bec986cb4c40173f0ab7c5b3e93b22748e265b35e113c30e7a63e446061a24a9f3470cf03844134377a4ddf23dce30976c5ef975b37142b385116563590ce0271eded617ae146ae32b440e578c165534c5660df9065a87bcef6ca2bbeadf9a318d42fd31f9c51d58926aa50aacd71da76d40b934f19890bfded10772b8c5fdc7cd0eaf8335e53d593f59ee6465d0a6710a985c673dc8a1d0e948df9f7fea3d503ba4ddaf3aa86415e8640e6981e01309c01ca3251f7c5da4062013b208e581df6af5366ebc943014e8817b66ebc9d12e5e557589acc00e8bb095c8c8bc89ee5e5248ee766fe4308748cacf6ac9eed81aa85062b9eb42eb66fd6b02b43858c59ee72d666c24030f828e8ca2b8ee43d5e8a0a732be2343d520248f87bd39e8df0759ed818173cab23cad19f7ed9aef1eeae590550e2dcb0eedca9d5a92874303f6360160ea10e7836ede94d8c0fe2a6862ace0306ea6d375d0e42100bdd3c32c7a074669ffcc3abfb69d036b91bb90e296179b7bf5cb4fd0854fe348b9948d4196a4665dc12c95e0ca4f8ae00570f77576990eb3c7c8c3f5c62065b560be4ff37453670fb661fe969745b82610975c56dbd839df95338dd20cd17bd6d12412235a88a22df87755b07d2fe64285d00fa67bc6d691189d669c48008fc04f6cc38bc40adf23153c4421bdf8001deafd33dc9e60f5570ae5de1dd3efcde5e5b89daf2ae4782c670b7e7e1b459e2692f2c7628a38e42726449d9ebedb9d2e202bcc115383767d035db944731499b3cc290fd381ab5b953cd7ec2bdf5f4bde0daa2dd8771ebc48e7896e70204ed4fa786e11418dc273c6e954ea7e509d5ec294af786f272c23bb7caece027098b9e4e9f90647baa0527c4b038f493a1a715961bbd04ad5ed148bb439de93582a2de57687c524bde59dec01326f4975eba4fe3912511e94456f1661dc33a7110a3ebd31771384c8ea61601610e9bb8603e87400f0218de41ec57bc96a40e67467867683b831c9809b31e71f9118059f5e3758fb4bcdd7737a7659d70dcabfcba1fef426101344866c574660edee250b06c7af8dc52a8408334e9491a349e40647fe3777c5cba76f4797ad4be36912844b69503f887496cd7f7f42d3ba84a2873046f419f9fcea6fa9090029c35c350508dd626056175e25ca89c1f521187374aa2ea6a7fc824870d78176242a74c57d8b418922c133b038bb38efeafc647d0cdd4017a0e875611fde5ee1deb083ee370010771ed2c81d919821e3f015c5cbe644125ef440cabb20763222a97f38bc5df584c06cb98bcb5abf56780ce8b5de280ab475ec638ab3cb7485cdcd4542049b420afc9104938d9c0f44512c40d0a048997f8a3fa1d2c7a57f9abb37194ad62667b0401b00f9c86df6e90303b571d2452a4e3cc9f2c14470723e3e229af390e031575fa2760397a7ed6c1db86f74856ac32cd836ea1c066c4202d3d81f7556c5721edf5b89f9262001658024a1a3e6326a8def204f2ef06da41087d04a46ccb306f08660dd75c0f54edc1e4c7de51a3d1526b85fa422a5cf2b2194a7d34efc533280046f45abad2cf8f3e88192a8901b1bb1e48bea33bdf91ce25f24789b13589a0b60337cf9c8e4864b523f9804f6f2c0b3eca02ea659c8fd3d6ebbdc41a52b22222009122931c9ecbf19ac07ff590b32effd3e7e0b098dde763fdce767167b86dd491564c2a1efef3ff27c8b47b29d4526f4e5974c4e2dee8b9f54bb8a0abac9e2d1360fecb8a4ca0b4ef515bca300544d26c7d035b7adfbd2fa4572fee7bdfa18875f2b115589df98901a5642049b1efe98d6c60acc72094d822e921afa8953473dd86877f02531bdcc4e1905e9be5bf8a2879d5389b161f885113ca7333469c3893afe26a26ad40de785aafa127ea20b26a67411fc3d5c853cfc2aa2f010f4b4a47d8a383ad90dcfb337f1c745345179f7da3aed0ae4c4a64fdbeab52ceb746be16d0080f13d686fc619a91b12439f9e155a30676961ed9675159bcd19ffd0232432b77cdc1442bf328fd44fb64f49d8ca1c8b5aaa194b52e34420dd6ce44cbc02ce622e43c4c6be513c315473e3bb9e8e318ad5e2703ec11ea2f0698ec2bdcc45c7bdb4ede65fc27ba51a77704edd28d72200bb1d2ee6ecb4be2dd21a988514a9e0439b80670473dfe30b5126f2626004eae9eedcda0fad55d56c6aed46a60b8f9d7a4396dbc65a79c2ff426393f8ed76dfab201d7fbffcf4e588ff2c416e9c03a38155b180aa650c3a830efc6d72a69d8bfc32972499122082793bea53c5f1bdacaa0bb9e9996a3d9c70a00dc34ddcfb8e9980947cdbe197d2ad489cc74320d571d3511d1c5a54cae17fc0f79779539c308bf0fea54df030006075de194425fee2dff15cb84e0bd2f30aa60a2f168882d8655d4bf735e76705cec0a2f8cf5e480fc82887a30d33d485ecc0e878962137fcf2201760b725d2c9c744bd1def1bd1fb2b53ba68cb9100a6a7e76c4f869a6c647e077ddb13be8e57f6bf929260fd21f95b4274f9ee0098ccbd86dd4d78825327fb5d296edd3440c74a11ccaddfbb8569bd8bcecc1a0219e12d2f08327daaf126e9c871856765bf255cfa0d2d76da2376cc53d4e77b0ee20a922bff809e9563e3d93903bd5394ba7f397accf675fa05b89d51cc76bd392c86d48dd709425ec873b7768dc3371b98dfa77b39610a7ba5540699b5c63aa82fa0d89706e8bfe5a862c55d127f04df660798b2f5515af29e9a573e5bd2a33575eb0a82e470247acc7304dc2ea93d7b07fd960ac6fee3cb060d00902649b6e91f58cd13f4f462b73872fcc31d5c594d0fbf3b19ac6ce4879e388df35d8fc07d3f8be4d9985cabf476025294c5a80f40b6ac73b1e73c72aadd13e14a1bb09a464e5297ad0eec7b2b19bd54055bc04cc144c99a2a7b29f98b50b5563f21e01d3e70722bcdf5784c5ded104f900c0d9d28a51a5aabe1c5feb372aedbc7aec157e31ac9accd48da565e0c2431d982bbc42fcd1fdcacb484953885a77f699008313377b5d0507d3f667ad4efa77a3bdc14131e88f1b1c47d14c1fc32b75e42541db0ee98120b0f325e815b5084140965c33f9da8aff4e86584c39929c886ddbce41109f91685107807e88e8adcee52f4e4c3c7ff16e4d6ba71d227768eceb5c8137b0788ada3ce04dbdf599f9da51d022b4ebbcc9169db481538390bd409ef67a1242e7f8022a", @typed={0x8, 0x90, 0x0, 0x0, @fd}]}]}, 0x11bc}, {&(0x7f0000005f00)=ANY=[@ANYBLOB="ac1400001d00000825bd7000fcdbdf257f18439e9a6bc7574a8d38bb3f27c44a422cfdd9cb03475b5ecf9202e84ff2df60912808008500ff0f00007f128b8056c07ac80fedaae32d1c3298797f4e227cfaca2198f0beec5e7197792f049e2787586114003d00fe880000000000000000000000000001c7cb4232c772b768aa8ee61e4a6d68b4055c002f28d013c7b7f4069cad2ea6a355d0a394473b771e18a596e8c26aeea510fa7ae0bfd493df9f77ec433675fe52b30b01c4215f98ce77a081d691cabb48db51bf3457d5fc4bfa1a861a8ce3401b1b00079be5b1b2ba7d7142cc1e8ea7269bcf829e1c6171fe6a8d4bef22444491eb8ef6c7806416169e1b0d498874bbc17ee891c24475fddc9628746ac2c92761c1587b8eb8cb118ea7790f880ebe7df92616df1eca12cde6ab0fb3bd8054455705d98aba8de2d7e1d1ce1068198369511de3269d89fd2181686d9e342ea3db3542ddeaeff8d1501d2f941c5ac0685a7477019f8cb2bc195a0ad2914b27eddec28f1853a655f2b4ad2fca9fc45452603129f2567813b5a42598919963b03113e44643a57b08a707a450dc9633315e50088bfb207026511e3060650e117bed6c21f756c82efbd6f89724804b1558187b576c71b88352cad4de32817cd8b584685e6ced9c7a800af2630febf804dc49ac12146132cacd84a0060ed137ff54980e925b18732fa93445ea56d232262d789b870906a28189bc69b5c881d0b047d9ad64b035a4942a89ebe7faefb8abde7c0424ab359d0dee72b8601e190277d89f034622abdfb5f2038a38e44ef3e70e28c537b2e99dd8ba85f54e29abb81dd419752eb3d6443c4946b3b0cb9add593775ff3905d4e0d33febb0b0af570846d8859637a705c3091c41b469d044f2a92f2bd4a71bc40946424c310bbd06eef685ce1b701ed4d68394454d1ea5e6b3155d7a52abd5043004ec9f2136a8ef041d8c9238b55898addfb46ea81b34527b26d095f0c763e4e4fc0f8b7192f0ec4c8d48208a33bf17009fa29d373c9337de7d08de547c2524e1a2162e39980764bc9b98238424302c06c8b38fee8eac1ecbb1e0146ca171fb8f6073e0a9443d09de33eb4fd7345581a624581a8625fda3d290e49eaeaaafaa670117440f0574dd30d3c6de83a0095ce8578a60b5857facc02812a821a263841cdd1f804e795a289284d39c1f8cb81600b377d5923ed69d67799bbcab387229d320d371ba1e7394c13e1a8ff08df2d1e56e7ab8fb39bf6ed5026cee64b402bad2a9b52cf571ea24894aaf08b68f34fe9beb18105d9a24416f3f1469f4b8f91bf558ec02e3ea21321ae1b839b09589c0f428d53cbd50cbc449c485e606b0b7f825609ccdc8b2eec69ea314ae5780dfb68a3aeec439a15c90b0a0e0a951b4251590135546c2d0ce2d9a8eae1cc29bbfcb9fea4a1ed289749d98edfae92b101f509d2d19d1c04ff4bb2f479f4c3564f839298a366b77cec5881f374b66a644a50e05f9ef2df9b8a67a7c88144dfc1b984c24e80c09a81ff16ce10c1c72f098023b27b6dc2a67c356b6ac15c1203a7dbad7b3c512656aa44c8d4fc0fc6e2328925b98896fe08a5bbfa74eae5249215b6d17bdfdaabe59b50e2b409fbb1fb39cc38fded4e133191952c2e5aea270358760e16fc5ac3f64d9c0dd0c977275406879d1d655700d5f8645dd5e43598997a88f3e583f9e9fb2af84fe8b5257b772b6696993331386ed6da7d40a22491c1daeb57a0142a1503798f7e06fcdcfe8567344e9fdcc8620d0f7a74b86356ffb197088fc982558a36568b68242f80901c7979fefcf8b8a6b557b7978bb2480339f84a8cd30529bc2edf5a270e100dc8f139848dd363916a8fd68ba11166857d699665ba5aea896266a8df085f8846669c9223f79ee3b1646a2b084ad077a2fa19720c50804da45cab913e122688c292dc1ac784a3826a5bca9a8ae2bc13a10d4a278aa3980f1a3f60588fe9237324d01f4d005d419d542bac3cd923efe067e3ebfbdf9abe7683596b898c613ebf756c412990b7cbe8e45fbb9bf025362df339201f97f79854d2b034b3624ad56fa0004c10ad2625f2bb159be2544463da6e2484564874fd80dec0ebfaddb7dd77710aed01f688823b66e97c222bd802b1ed685778a71dfd415dde3baf538168b9a9e64b4138c7e5484273c8d869ad164fb31ba9651579417a5c847bb2140c33d410b86e3567ccd2dcc206474dbbb4013f5af3310f34fd31724fe50495af86bb2f612a98abf7bebb903ef59f738ba8a14a7a1280488edde633859e9d0164e1c9b01635bb1b77162361dac061aadce116908d95e91bae6a1d56e921d8a6f31ce620da1b6194887af326f1e9dafac037a1a4b804a1c8c1c2abc25deebd9b439744a1b786ed6c1f92061c3939d5a0f4e7328ac189141cd71bf42d0f4b0a0054c52145f4e56ba94541703f52eb65f0bdd725ca943215f2e2190600ae90a0ecc5184e6f8c596e408f46624ba410528126fc12b79e746353101d74dd0f6d27182ffca189e9417edf05b483545233d6a00d29759e424360d4352e4bdf224daeb12852624bbb3a47000bbeac82b2cb5b563f54ae5875d293499d07e10cf1c57fd6cbc2a0ee3de05a654dc4d9f9e45ce47f0a57fa122f22c1913bc141111a654c1aebbfd831ea869c0a478bd6aeea4af64498f09411b3403df5984a1b5d2e099fbbc1eb0114598edf7d9971cdaeb178f8545804737bae33b1d74ee3558c996892a9f31fbff80b44a6c5c050b65d36b809b5d6241ee7abc0f8f9bcafdfba78e4cb03b31b70052dada3db917a9e6e88c9d584f310e8c2433f1cf65ced409a7eb333f5d9e15a4aaaa38f265033a65a3c4add8a10a4f8a64368553deb3dbcf5a50f99def265bb9823efadf41adbf6692ccaf9273d662aa4c3095116d6ae19660496f738ead289159e8e540e0a6b20f6f4ce2002f59c3cd0604f808f85093f8b43aec6291e1cdc2f6352e499d21f4357e66df7abaece749e568568f1833b1627d82ffc3800630194087a63fa5921099384d34db5c7f1ff8b4d83fba17389062323560d0a40ccc4b4ca218595b27b26ed5365475b6fc32a6c078a8e147adaf40d93c60ea7eb1333e4a646efa9860a73847238dc2e42a46a2a0a9b9d35a3b6944bfbd3b97e97afe4352d56dc700fe011ba8ada8fa7f4d9abfd9b16b94235bed177805170c8a1d941b2edb4c395615004328449be042d8b86125f4c7c40f8fc060448e9e621215556b03d30d464dfe159e62f7aa09ec634f08d1137fc85000f0905a436cb5dfc5eac1f8a3eb2a65856dd6c417a87b51000ad1d57b4814627007bcf9795aaf51b33fbb929ce801fc5f754d39ba63fed2520c47a93c6b5f4a756ec52b51d76179850586ddfd5647eb6169f686baed00951760153d7794ea928a5003bd1338466082a3dbac594940750201bb8fe8ebc3c6eff253a976d7b12ada37818b2d33c031e10b1585c51ffcbe944c4e85a783508ffd525530767d82b7ad71b9df9ce43b7de1ad644b09695d4b17a557e86e228526f3bb197855b4c74ba2b3d3fb42a964182f5fdf58c7a9452c4036d92e088b5c8dd1554eff69f8c1288c6dcad9b16e3a123ed839166f6123ca1af594ccc42afcc45404cf281363a8104bfabc2caea8e63aa463a1e2ab5139e0f9e6d81df89cbbe6ed520ef4e97350f83a8e15c1f856061966a5b47c0d6dae189dd6aa81a752fbb9a13da4f217f0c7b5d72ecf9e335853252e0c8e85a41bac0d0adb0191dae34b37dc2f52b6730ec3b2ccf7ca40f52d7badbea8bafe23b77591449abf4fa013679f2350aae0a561429009fbb5f67b4b7ca593b1e889d8bf74d21f0fb6e86aa7eead182af07ddb5537306ff7cad0856a0357c01793dcd7b62315c746aa06137741bb9dda623d8bc48196db7ad88d483ec691f33f08bc90af10effe10880a50b75f614ad6205800a9f0f2db800f158ff2090ec0109fb26d649122cfc5b5ed6773536558e179e2cf42bb5e345fb451075c1476c39757a496da64a71166a36ad4a92834d4643d534e407594cd115fde350526d97a0880e94123ca66f97eb6595dd999ded1c8caa843d27c3dd8fd1a391f0965100e0d4178005e3ec5ca7590c7493c45b67436dda2056c6cadfd9a3644fd8fc211219d27f5a29e74481fa2bce1e8707f7cb7907e3546381ae598019339aa50651bdfdfe246c9a65ea106563570597a1ecfb1da5b24f43709e941e43a07c0cc2173b39f08edd423409899667d84bd85001bb7d5540a71c248ad65cb04bd3f5ad7c45f7986bb86cb398497970ac0780c04b68347e87e9342daea277f9cb63e11e8406c5f5be677fc67853f2906b698df81066116401630f01b3e9489a451d2a2f03513bd2d834c2d8dd3048c4723738d820732dc0fac595d26075ae562e51339c15793b4bc04fc936cb5caa64067699293f82ec907e9e2024c56d3c35867c898ebd7b70ade3a0a679c96336cc9df631bceb915de3554dba96e89c087a23f6f2f77e919151989f33e4d6694d6b82ee0b975af6430921168f396aed73564b537ee89e5216b0c8ba2f450b7bb43823a8ca50a065884d2fa37905b36d0d5f468c9ac9f4cdb4060ff40a14513c5427515eb0b03fda305567bfb97d50c9063a673b23933bec371d378c2e6538d48241ba5d1a7fafb1409592c1dc95c42804d8d850cf5b198686bd0c03e0815f9fadd68065d2dbf016b5cdd363baf2dd67c0afa8c219c37421df4f318cc5405e3843f90b7c8135e8e1076fab847cec4694edc1a90613a1e76463b989f5c694d2418e3f0b29c739a0c2eb30cbdadec864736d9bbcf5973a05308ce7c754e73251c1b89b0bfdb1bfd44b931edad7cc5c5d1f5e8bdd13b779291506c82cb2e405080f063f277e897634c4d566867c969d21a77f3b5ed340792f0b8e41ad3353259902d8e8ec18ed0cd5badec14505e1e3229b4d67ca244f1b619139afcd258755626ab609d3da50e621383b8e2656cac4e43aefc8773a4ad1d259acbfbf81a6fe0f5af4c448fe431b6eb4f42a71ab1ddccec8edc5ec5f536c2d9daf74f22d27c6b6299b5bee6002ac46372c390c5f847f256dd34e428d27ea172a0734ab15a7b48c63dfa8eb81221b7ee1872ff65da15026aae88fccf12a0d7bd079732818481525b00589d929c66f0a2bd2fba2ce2365474a4b4992ec384b4066c899984b91571c6703d9054afdb7a016a49e4ad6569b1b9a5bfda8262cc511001e6b439db0a99ca5d3d0b305ebd7fc46d6019db295547ab66524806b0aaeff7000a5b65fb351e9cc1b85a1f7fc7ffc1b9bfcefcd681892c5485f6565979a885668c261eb7fab566957eb5e0bd12aaccf749eed87bc7ff16ad4ea00d6d1cf77b299c41d6a3b912e219662b682c1a5d81562ddd63ebb11eb82a13027c7d6e17d7575bcd490f0294882f1017ea6bff3d1b5eadf187b22db23b388e1e8792a0779fa3d3c3d0663d5bb7995349cf34d67b4478f6ef46492f88d92ae36e41f145e07b60ecebc24c2da34a8fc92dce770c9bebc661c3504ae0c4d2a98ddea9874efe580e8eeff834f72f4e510cbaf65c82851f6349c0d533e7eceed06ac9b1f1e61d97f65d61b1016b4c35f83577a396c05a6187fb9efc079f73e8a677ce6d6a7d34c5ff0600754576795f8e5605e5794ab61daa0cc70951827c54767d88b492201b079035351d6ffc9da5b60445d17257be61b6533aa3e47dcbab4e534ff05750a3fb3879141d18cb47ef7aa0c589a5d16845d292040a4076d48ad6ce545f6fbf0a16667001129644414b46b8d5904d4bc9c5c46bab2b67422b495eacb25bdb221851b65a7f4afd09535d9cd5ccc395f5b3fa5786382f7cb58009b321c7ee7d51fc160f73ee09b62a2438256f725273a7312fbd07079d9f18193126ee8e22053ae676e2168495ccb6435e886773dfd44bb1711c9e53e73f264d0d8335348d75fdf52693aefb1a507bad29e95f22dcd3a9d5360af5c23bc703d6fabef50589436d7d62f8b97c227e5afb7341440a6ad35b1ff1f4b932e2ac9aea1d132885c8692d5123a74490811ec348ed9206d2388f0c21865075e39b8620b543659087a79dc367bf486a8d15ad7e4729e85a84adaed714105c51553d725f76ae42c3a6753395c8694f2df7ff3f5e12964330edd4276e81c4d5356cd894207195d13c0f2e0af5d03051eb8a63261da9c1c7138c706d86ee0f9aa433fa12fc1f01ac3de339e08d70dd97995ddce98f989a70de89f408dbd25244ecd6e24e4b28ebf0c18a7f888b8b51169f33a149423dd8fa2242564423d49d37c37ef17beca6ee067f4bea5544df6eba259bdee760cd056963f1416d1c83f44449d954d80c57a01421b4253522f6b80f686a4d66c4ebc47c96df5944c4bb09c703422da40020ee92b9d2b42d7fe4b267d9dce93b2ace1ee14bef4db46c6719c4680ab218585bb8c41eada417e3b126e406d356ae78dd331d68f824efbbe76794b42066eea0b6c7ef2ae29d14175cc79bb4ebbf050447a81fc0eab2737617364981bcb38913cbe580f4427511fa0b52dcd432c5279a160c006200ee0f000000000000aec24bc65aeb9aa171c6880a49d242709ba49d52be1a6e69c53ef8b313f139c345ff6d1ffc20280721b8383b8b5044f437b7b959cb7d00f6f598b41c3b940c9ea31f9a4017dc8d51b86a84fb334642db7d0eeb6fa6a4910828bc82ba600751e00b8daa6f6e117a477faa13bc53e3e33d29935728829b7454530ec9b77c553b5a4850d67d46a1b50b740008007100", @ANYRES32, @ANYBLOB="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"], 0x14ac}, {&(0x7f0000000380)={0x2b4, 0x1b, 0x100, 0x70bd2c, 0x25dfdbff, "", [@generic="e50e32b178ab20856729897d53c9d36009c8e21b46b0ce44264273403f398c4c92fde04a9c177b28e2433c0b17935b5a7cd9d4181607e03c53659aa9897a67dd6b6e62cb0dfe87867b913d9506f0fc486789b4d23968ebb98379b3b03f2a3e70968417b5b8f32aff30d2fcbfe64af47e4e2cfa64a571a3ccaf789a097b3c7e714ec61ddec31326824ed0f9daa2ed4f4c3920ca23fd389c", @nested={0x20b, 0x79, 0x0, 0x1, [@typed={0x8, 0x67, 0x0, 0x0, @uid=r9}, @generic="3a6cda1018fdf424111631b67bcb859628414a3a8cecb6df25f5a4c8cef8add2787b79542c813de26acaf63bc3d92270410a9e7b1cfa1c58473e86b76225f3db14d4b8262445e2a92b20a070314f1188d890f420bcc21f1b71d69d9c45da20db66121003770d68b1d1ea2406a68308fdf95543e327888f8703463bd11611b748a440a14a02341d83afafbd29596a2b82fe238e438928b6c55bf8e80aa9196c7fd6f01601812e8c1f0f1e0e09779dca6ec05099ca650dc61ccaa4b68da215146347f4b15d71afcfa7e332fe7a1287144a4e39cdc1b65f15d8aadbc65152244c1d9ce09d493034701372f35c54cd322951a870e9d2f3e52be62eb143607c33c1", @typed={0x14, 0x16, 0x0, 0x0, @ipv6=@remote}, @typed={0x1e, 0x90, 0x0, 0x0, @str='cryptd(crct10dif-generic)\x00'}, @typed={0x9, 0x24, 0x0, 0x0, @str='hash\x00'}, @typed={0x14, 0x8f, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x1e}}, @generic="f51265adf184c35493a02e69d64ffc07b1df497574de06247970c6d8b94f9f9948a0d5d490134c66581719b12a22c047d0563c7f06c50ffba831fc503fa2d8383fdfb1c56396ec895048cd1265ecb00178a784e7ba4bc382590c7c151e28b03bddaf4ecb695b2b3f997f7a508af18c40772c0a7e2965471bb541687300e406847d008d1aad2d2ce323f8e0a2c22cf7042d15d24a77e27bedd5428909452f90b9b6a58335", @typed={0x8, 0x0, 0x0, 0x0, @u32=0x9}]}]}, 0x2b4}], 0x7, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r10, r13}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x40, 0x4008000}, 0x4885) recvmmsg(0xffffffffffffffff, &(0x7f0000004d00)=[{{&(0x7f0000000300), 0x80, 0x0, 0x0, &(0x7f0000000780)=""/233, 0xe9}}], 0x1, 0x0, 0x0) 01:17:16 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x52000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:16 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:16 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:16 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x0, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:16 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x8030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:16 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:16 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:16 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xa020000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:16 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x52020000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:16 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:16 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xa030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:16 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x58020000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:16 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:16 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x5a010000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:17 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) [ 1979.227341][ T9039] __bpf_mt_check_bytecode: 28 callbacks suppressed [ 1979.228715][ T9039] xt_bpf: check failed: parse error 01:17:17 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x0, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:17 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x11000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:17 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:17 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x60000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:17 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:17 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) [ 1979.391345][ T9046] xt_bpf: check failed: parse error [ 1979.395726][ T9045] xt_bpf: check failed: parse error 01:17:17 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x12000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:17 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:17 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x62010000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) [ 1979.538385][ T9052] xt_bpf: check failed: parse error [ 1979.583043][ T9054] xt_bpf: check failed: parse error [ 1979.631776][ T9057] xt_bpf: check failed: parse error 01:17:18 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x12030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:18 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) [ 1979.778343][ T9064] xt_bpf: check failed: parse error [ 1979.831522][ T9066] xt_bpf: check failed: parse error 01:17:18 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="b4000000000b00007910000000000000c310000aa1000000950074000000000031fb0d3a42319fa204399d17d34e075fdcda533ab1aa71ab1d764152e6cb25dadc7ded5d05000000adea9fca11027d29066927603deb92de3141e8ed7ac5b8902070213cdfdc5d6c4890cdeb50347c2f060581172b94c6ba22a2b58eb6cbad46ed6e7965a2ba103b0b36f790bb41931f9a3d4dd127c1b4e49f7468f5e603950c4f67581c92ef8a7e8ece0000b9528454a057b5e6760808e8baf4c29861676e03bab49d5beadea592c048959303dfd62c46eac29e990747b62b9ea11385d59e5f60131dad5e782991cc922cfb97983a839d16b986ce8a939705aaf5a9443214f515c6026d0655d9efa6f49d6d9c8b6a59e34265019c90dbb4ef7c8fe90155436b571116d3b4bfc2d71b7a2a966a628549b1b8c46986d9ba8e0ace933a95"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) [ 1980.348094][ T9070] xt_bpf: check failed: parse error 01:17:18 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x0, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:18 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:18 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x62020000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:18 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x14010000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:18 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="b4000000000b00007910000000000000c310000aa1000000950074000000000031fb0d3a42319fa204399d17d34e075fdcda533ab1aa71ab1d764152e6cb25dadc7ded5d05000000adea9fca11027d29066927603deb92de3141e8ed7ac5b8902070213cdfdc5d6c4890cdeb50347c2f060581172b94c6ba22a2b58eb6cbad46ed6e7965a2ba103b0b36f790bb41931f9a3d4dd127c1b4e49f7468f5e603950c4f67581c92ef8a7e8ece0000b9528454a057b5e6760808e8baf4c29861676e03bab49d5beadea592c048959303dfd62c46eac29e990747b62b9ea11385d59e5f60131dad5e782991cc922cfb97983a839d16b986ce8a939705aaf5a9443214f515c6026d0655d9efa6f49d6d9c8b6a59e34265019c90dbb4ef7c8fe90155436b571116d3b4bfc2d71b7a2a966a628549b1b8c46986d9ba8e0ace933a95"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) [ 1980.649736][ T9076] xt_bpf: check failed: parse error 01:17:19 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:19 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x64020000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:19 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x16030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:19 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:19 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x68000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:19 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x18030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:19 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:20 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x0, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:20 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:20 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x1c000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:20 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x6c000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:20 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:20 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:20 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x70030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:20 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x1f000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:20 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:20 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:20 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x72030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:20 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x20000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:21 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x0, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:21 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:21 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x74000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:21 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x20020000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:21 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0x0, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="b4000000000b00007910000000000000c310000aa1000000950074000000000031fb0d3a42319fa204399d17d34e075fdcda533ab1aa71ab1d764152e6cb25dadc7ded5d05000000adea9fca11027d29066927603deb92de3141e8ed7ac5b8902070213cdfdc5d6c4890cdeb50347c2f060581172b94c6ba22a2b58eb6cbad46ed6e7965a2ba103b0b36f790bb41931f9a3d4dd127c1b4e49f7468f5e603950c4f67581c92ef8a7e8ece0000b9528454a057b5e6760808e8baf4c29861676e03bab49d5beadea592c048959303dfd62c46eac29e990747b62b9ea11385d59e5f60131dad5e782991cc922cfb97983a839d16b986ce8a939705aaf5a9443214f515c6026d0655d9efa6f49d6d9c8b6a59e34265019c90dbb4ef7c8fe90155436b571116d3b4bfc2d71b7a2a966a628549b1b8c46986d9ba8e0ace933a95"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:21 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:21 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x75030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:21 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x22010000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:21 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x0, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:21 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:22 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x78000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:22 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:22 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:22 executing program 0: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x40000000, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:22 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x2a030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:22 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x0, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:22 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x7a000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:23 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:23 executing program 0: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0xca01, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) [ 1984.649010][ T9169] __bpf_mt_check_bytecode: 25 callbacks suppressed [ 1984.650049][ T9169] xt_bpf: check failed: parse error [ 1984.665800][ T9168] xt_bpf: check failed: parse error 01:17:23 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x32010000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:23 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x0, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:23 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x7a020000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:23 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) [ 1984.825831][ T9178] xt_bpf: check failed: parse error [ 1984.832791][ T9179] xt_bpf: check failed: parse error 01:17:23 executing program 0: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x4000000, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) [ 1985.135432][ T9189] xt_bpf: check failed: parse error [ 1985.151601][ T9190] xt_bpf: check failed: parse error 01:17:24 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:24 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x36000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:24 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x7a030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:24 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{}, {}, {0x20, ')[-'}, {0x20, '[\xf1'}, {0x20, 'hash\x00'}, {0x20, '*!\xcd]$'}, {}], 0xa, "6409dc11813c299cdba68653f3ddc39b85bf69ae09b29448cd42159f0dc15cce580810d1f0aa0ac267cab2ce4334c20a98345b73bc121cc8867f60939c68cd45f33c859fbfba02c851ec9bcd6ca34387404d4430ea497bc4c205f15fbb9604e45e93e072ed66052b4022aefab540c6841895a049a243a291ce96fe11b2ce4f923d6bece1ea98c9cbc959f8ffcce725d7fd77e4a8deaec8daae2b1cd939abc3202d3efe8ae9567b30ed6d509f9cea5a3ce5dc67b43ff59f7bab"}, 0xda) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) 01:17:24 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:24 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x0, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:24 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="18020000f2ffffff0000000000000000850000002c00000095000000000000003d789ade838a5ad00c21f97a9d6f55528c474cb385573d9f5ec0798d497a5d0ab93dbb637fd8de14970b4f76b599913ff77098a8cd276dee070239f048bff4c9d61b5c334ef7384130fd875789e46307b8f29c46149360bea59a42011aabb3125f93a06d27b6cf4f033c6000c3ab63ee03e9e7023574b86ce473bc8964c32f955d410083f7567775a2ca15dbbf01550310a78644e801f1753107cee250cb376879ae14b9e1ab98703bc7db41925c55b0a4141ae3c08d264831d0f6365469c356218500000000000000000000000000000000000000000000001a18f6de00bb8c95f8bdc2a54e6aefee88e5b1f6fdbc3a483235918073d11474cfa5d71d92c9bd2b72c3ce63d47075ae7c59d82cea1243db36970e2f56ae270cb56281877934e999394a7dfe2bb6a29394c82bfdffaedc4df6f74e8f286454fca6300d100e7eb8717c8528e445fbefe6a3139191529f22e4c0435e5c53e469f70c08bdff633307bbf119ffdb2e1d717eb268eea7322da5fda4fc19af52289d000f2dd88dda869c8a84dbc54c10bc7fee0486fa294b41c1d4dc44a9801c34ad96bbd834c7dd71160dfaf15a150d0a0b01a6168858b5d085a8b3ca5c3bd8534edc32c0bd1fdd112a1dc6f708cbe1a9432887e17fa9e6f63c1d86f6cec7b362ae4fe101db6870f021269a23a10d6f1301c86b2319d220cf568a6289c751e0c0098d57ff070615e9"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) [ 1985.950880][ T9197] xt_bpf: check failed: parse error [ 1985.952208][ T9198] xt_bpf: check failed: parse error [ 1985.974370][ T9199] xt_bpf: check failed: parse error 01:17:24 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:24 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x3c020000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:24 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x7c010000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:24 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) [ 1986.181588][ T9206] xt_bpf: check failed: parse error 01:17:24 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x3e000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:25 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:25 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="18020000f2ffffff0000000000000000850000002c00000095000000000000003d789ade838a5ad00c21f97a9d6f55528c474cb385573d9f5ec0798d497a5d0ab93dbb637fd8de14970b4f76b599913ff77098a8cd276dee070239f048bff4c9d61b5c334ef7384130fd875789e46307b8f29c46149360bea59a42011aabb3125f93a06d27b6cf4f033c6000c3ab63ee03e9e7023574b86ce473bc8964c32f955d410083f7567775a2ca15dbbf01550310a78644e801f1753107cee250cb376879ae14b9e1ab98703bc7db41925c55b0a4141ae3c08d264831d0f6365469c356218500000000000000000000000000000000000000000000001a18f6de00bb8c95f8bdc2a54e6aefee88e5b1f6fdbc3a483235918073d11474cfa5d71d92c9bd2b72c3ce63d47075ae7c59d82cea1243db36970e2f56ae270cb56281877934e999394a7dfe2bb6a29394c82bfdffaedc4df6f74e8f286454fca6300d100e7eb8717c8528e445fbefe6a3139191529f22e4c0435e5c53e469f70c08bdff633307bbf119ffdb2e1d717eb268eea7322da5fda4fc19af52289d000f2dd88dda869c8a84dbc54c10bc7fee0486fa294b41c1d4dc44a9801c34ad96bbd834c7dd71160dfaf15a150d0a0b01a6168858b5d085a8b3ca5c3bd8534edc32c0bd1fdd112a1dc6f708cbe1a9432887e17fa9e6f63c1d86f6cec7b362ae4fe101db6870f021269a23a10d6f1301c86b2319d220cf568a6289c751e0c0098d57ff070615e9f21e6e71b281c016d42413122b787041d4b7"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:25 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x3e020000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:25 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x80020000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000240)={'wlan1\x00', 0x0}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_MIGRATE(r5, 0x6609) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000280), 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="48040000", @ANYRES16=r6, @ANYBLOB="01e5ff000000000004003b1c210008000300", @ANYRES32=r4, @ANYBLOB="2c0433005000de295b3acba52ee4080211000001505050505050"], 0x448}}, 0x0) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:25 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x0, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:25 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="18020000f2ffffff0000000000000000850000002c00000095000000000000003d789ade838a5ad00c21f97a9d6f55528c474cb385573d9f5ec0798d497a5d0ab93dbb637fd8de14970b4f76b599913ff77098a8cd276dee070239f048bff4c9d61b5c334ef7384130fd875789e46307b8f29c46149360bea59a42011aabb3125f93a06d27b6cf4f033c6000c3ab63ee03e9e7023574b86ce473bc8964c32f955d410083f7567775a2ca15dbbf01550310a78644e801f1753107cee250cb376879ae14b9e1ab98703bc7db41925c55b0a4141ae3c08d264831d0f6365469c356218500000000000000000000000000000000000000000000001a18f6de00bb8c95f8bdc2a54e6aefee88e5b1f6fdbc3a483235918073d11474cfa5d71d92c9bd2b72c3ce63d47075ae7c59d82cea1243db36970e2f56ae270cb56281877934e999394a7dfe2bb6a29394c82bfdffaedc4df6f74e8f286454fca6300d100e7eb8717c8528e445fbefe6a3139191529f22e4c0435e5c53e469f70c08bdff633307bbf119ffdb2e1d717eb268eea7322da5fda4fc19af52289d000f2dd88dda869c8a84dbc54c10bc7fee0486fa294b41c1d4dc44a9801c34ad96bbd834c7dd71160dfaf15a150d0a0b01a6168858b5d085a8b3ca5c3bd8534edc32c0bd1fdd112a1dc6f708cbe1a9432887e17fa9e6f63c1d86f6cec7b362ae4fe101db6870f021269a23a10d6f1301c86b2319d220cf568a6289c751e0c0098d57ff070615e9f21e6e71b281c016d42413122b787041d4b7"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:25 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x3e030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:25 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x80030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:25 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000240)={'wlan1\x00', 0x0}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_MIGRATE(r5, 0x6609) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000280), 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="48040000", @ANYRES16=r6, @ANYBLOB="01e5ff000000000004003b1c210008000300", @ANYRES32=r4, @ANYBLOB="2c0433005000de295b3acba52ee4080211000001505050505050"], 0x448}}, 0x0) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:25 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:26 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:26 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x3f000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:26 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x86030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000240)={'wlan1\x00', 0x0}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_MIGRATE(r5, 0x6609) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000280), 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="48040000", @ANYRES16=r6, @ANYBLOB="01e5ff000000000004003b1c210008000300", @ANYRES32=r4, @ANYBLOB="2c0433005000de295b3acba52ee4080211000001505050505050"], 0x448}}, 0x0) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:26 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:27 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x0, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:27 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:27 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x88000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000240)={'wlan1\x00'}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000280), 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:27 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x40000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:27 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="18020000f2ffffff0000000000000000850000002c00000095000000000000003d789ade838a5ad00c21f97a9d6f55528c474cb385573d9f5ec0798d497a5d0ab93dbb637fd8de14970b4f76b599913ff77098a8cd276dee070239f048bff4c9d61b5c334ef7384130fd875789e46307b8f29c46149360bea59a42011aabb3125f93a06d27b6cf4f033c6000c3ab63ee03e9e7023574b86ce473bc8964c32f955d410083f7567775a2ca15dbbf01550310a78644e801f1753107cee250cb376879ae14b9e1ab98703bc7db41925c55b0a4141ae3c08d264831d0f6365469c356218500000000000000000000000000000000000000000000001a18f6de00bb8c95f8bdc2a54e6aefee88e5b1f6fdbc3a483235918073d11474cfa5d71d92c9bd2b72c3ce63d47075ae7c59d82cea1243db36970e2f56ae270cb56281877934e999394a7dfe2bb6a29394c82bfdffaedc4df6f74e8f286454fca6300d100e7eb8717c8528e445fbefe6a3139191529f22e4c0435e5c53e469f70c08bdff633307bbf119ffdb2e1d717eb268eea7322da5fda4fc19af52289d000f2dd88dda869c8a84dbc54c10bc7fee0486fa294b41c1d4dc44a9801c34ad96bbd834c7dd71160dfaf15a150d0a0b01a6168858b5d085a8b3ca5c3bd8534edc32c0bd1fdd112a1dc6f708cbe1a9432887e17fa9e6f63c1d86f6cec7b362ae4fe101db6870f021269a23a10d6f1301c86b2319d220cf568a6289c751e0c0098d57ff070615e9f21e6e71b281c016d42413122b787041d4b77e3bbabd945fd44eab70d205764e"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000240)={'wlan1\x00'}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000280), 0x0) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:28 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:28 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x88030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:28 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x40030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000240)={'wlan1\x00'}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:28 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:28 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x0, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:28 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000240)={'wlan1\x00'}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) [ 1990.066651][ T9276] __bpf_mt_check_bytecode: 17 callbacks suppressed [ 1990.066774][ T9276] xt_bpf: check failed: parse error [ 1990.092845][ T9280] xt_bpf: check failed: parse error 01:17:28 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x8a010000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:28 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:28 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x42000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000240)={'wlan1\x00'}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:28 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) [ 1990.308873][ T9286] xt_bpf: check failed: parse error [ 1990.329171][ T9290] xt_bpf: check failed: parse error 01:17:28 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x90000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000240)={'wlan1\x00'}) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:28 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x44020000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) [ 1990.501487][ T9296] xt_bpf: check failed: parse error [ 1990.536073][ T9300] xt_bpf: check failed: parse error [ 1990.629462][ T9305] xt_bpf: check failed: parse error [ 1990.679639][ T9306] xt_bpf: check failed: parse error 01:17:29 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="b4000000000b00007910000000000000c310000aa1000000950074000000000031fb0d3a42319fa204399d17d34e075fdcda533ab1aa71ab1d764152e6cb25dadc7ded5d05000000adea9fca11027d29066927603deb92de3141e8ed7ac5b8902070213cdfdc5d6c4890cdeb50347c2f060581172b94c6ba22a2b58eb6cbad46ed6e7965a2ba103b0b36f790bb41931f9a3d4dd127c1b4e49f7468f5e603950c4f67581c92ef8a7e8ece0000b9528454a057b5e6760808e8baf4c29861676e03bab49d5beadea592c048959303dfd62c46eac29e990747b62b9ea11385d59e5f60131dad5e782991cc922cfb97983a839d16b986ce8a939705aaf5a9443214f515c6026d0655d9efa6f49d6d9c8b6a59e34265019c90dbb4ef7c8fe90155436b571116d3b4bfc2d71b7a2a966a628549b1b8c46986d9ba8e0ace933a95"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:29 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:29 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="18020000f2ffffff0000000000000000850000002c00000095000000000000003d789ade838a5ad00c21f97a9d6f55528c474cb385573d9f5ec0798d497a5d0ab93dbb637fd8de14970b4f76b599913ff77098a8cd276dee070239f048bff4c9d61b5c334ef7384130fd875789e46307b8f29c46149360bea59a42011aabb3125f93a06d27b6cf4f033c6000c3ab63ee03e9e7023574b86ce473bc8964c32f955d410083f7567775a2ca15dbbf01550310a78644e801f1753107cee250cb376879ae14b9e1ab98703bc7db41925c55b0a4141ae3c08d264831d0f6365469c356218500000000000000000000000000000000000000000000001a18f6de00bb8c95f8bdc2a54e6aefee88e5b1f6fdbc3a483235918073d11474cfa5d71d92c9bd2b72c3ce63d47075ae7c59d82cea1243db36970e2f56ae270cb56281877934e999394a7dfe2bb6a29394c82bfdffaedc4df6f74e8f286454fca6300d100e7eb8717c8528e445fbefe6a3139191529f22e4c0435e5c53e469f70c08bdff633307bbf119ffdb2e1d717eb268eea7322da5fda4fc19af52289d000f2dd88dda869c8a84dbc54c10bc7fee0486fa294b41c1d4dc44a9801c34ad96bbd834c7dd71160dfaf15a150d0a0b01a6168858b5d085a8b3ca5c3bd8534edc32c0bd1fdd112a1dc6f708cbe1a9432887e17fa9e6f63c1d86f6cec7b362ae4fe101db6870f021269a23a10d6f1301c86b2319d220cf568a6289c751e0c0098d57ff070615e9f21e6e71b281c016d42413122b787041d4b77e3bbabd945fd44eab70d205764e8a61"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:29 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x92010000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:29 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x48000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:29 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) [ 1991.471653][ T9] kworker/dying (9) used greatest stack depth: 13296 bytes left [ 1991.497084][ T9316] xt_bpf: check failed: parse error [ 1991.526394][ T9315] xt_bpf: check failed: parse error 01:17:29 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x4a000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:30 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="18020000f2ffffff0000000000000000850000002c00000095000000000000003d789ade838a5ad00c21f97a9d6f55528c474cb385573d9f5ec0798d497a5d0ab93dbb637fd8de14970b4f76b599913ff77098a8cd276dee070239f048bff4c9d61b5c334ef7384130fd875789e46307b8f29c46149360bea59a42011aabb3125f93a06d27b6cf4f033c6000c3ab63ee03e9e7023574b86ce473bc8964c32f955d410083f7567775a2ca15dbbf01550310a78644e801f1753107cee250cb376879ae14b9e1ab98703bc7db41925c55b0a4141ae3c08d264831d0f6365469c356218500000000000000000000000000000000000000000000001a18f6de00bb8c95f8bdc2a54e6aefee88e5b1f6fdbc3a483235918073d11474cfa5d71d92c9bd2b72c3ce63d47075ae7c59d82cea1243db36970e2f56ae270cb56281877934e999394a7dfe2bb6a29394c82bfdffaedc4df6f74e8f286454fca6300d100e7eb8717c8528e445fbefe6a3139191529f22e4c0435e5c53e469f70c08bdff633307bbf119ffdb2e1d717eb268eea7322da5fda4fc19af52289d000f2dd88dda869c8a84dbc54c10bc7fee0486fa294b41c1d4dc44a9801c34ad96bbd834c7dd71160dfaf15a150d0a0b01a6168858b5d085a8b3ca5c3bd8534edc32c0bd1fdd112a1dc6f708cbe1a9432887e17fa9e6f63c1d86f6cec7b362ae4fe101db6870f021269a23a10d6f1301c86b2319d220cf568a6289c751e0c0098d57ff070615e9f21e6e71b281c016d42413122b787041d4b77e3bbabd945fd44eab70d205764e8a6142"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:30 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x9e020000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:31 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:31 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="b4000000000b00007910000000000000c310000aa1000000950074000000000031fb0d3a42319fa204399d17d34e075fdcda533ab1aa71ab1d764152e6cb25dadc7ded5d05000000adea9fca11027d29066927603deb92de3141e8ed7ac5b8902070213cdfdc5d6c4890cdeb50347c2f060581172b94c6ba22a2b58eb6cbad46ed6e7965a2ba103b0b36f790bb41931f9a3d4dd127c1b4e49f7468f5e603950c4f67581c92ef8a7e8ece0000b9528454a057b5e6760808e8baf4c29861676e03bab49d5beadea592c048959303dfd62c46eac29e990747b62b9ea11385d59e5f60131dad5e782991cc922cfb97983a839d16b986ce8a939705aaf5a9443214f515c6026d0655d9efa6f49d6d9c8b6a59e34265019c90dbb4ef7c8fe90155436b571116d3b4bfc2d71b7a2a966a628549b1b8c46986d9ba8e0ace933a95"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:31 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:31 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xa2000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:31 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x4c000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:31 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x0, 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:31 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xa4010000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:31 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x50010000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:31 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="18020000f2ffffff0000000000000000850000002c00000095000000000000003d789ade838a5ad00c21f97a9d6f55528c474cb385573d9f5ec0798d497a5d0ab93dbb637fd8de14970b4f76b599913ff77098a8cd276dee070239f048bff4c9d61b5c334ef7384130fd875789e46307b8f29c46149360bea59a42011aabb3125f93a06d27b6cf4f033c6000c3ab63ee03e9e7023574b86ce473bc8964c32f955d410083f7567775a2ca15dbbf01550310a78644e801f1753107cee250cb376879ae14b9e1ab98703bc7db41925c55b0a4141ae3c08d264831d0f6365469c356218500000000000000000000000000000000000000000000001a18f6de00bb8c95f8bdc2a54e6aefee88e5b1f6fdbc3a483235918073d11474cfa5d71d92c9bd2b72c3ce63d47075ae7c59d82cea1243db36970e2f56ae270cb56281877934e999394a7dfe2bb6a29394c82bfdffaedc4df6f74e8f286454fca6300d100e7eb8717c8528e445fbefe6a3139191529f22e4c0435e5c53e469f70c08bdff633307bbf119ffdb2e1d717eb268eea7322da5fda4fc19af52289d000f2dd88dda869c8a84dbc54c10bc7fee0486fa294b41c1d4dc44a9801c34ad96bbd834c7dd71160dfaf15a150d0a0b01a6168858b5d085a8b3ca5c3bd8534edc32c0bd1fdd112a1dc6f708cbe1a9432887e17fa9e6f63c1d86f6cec7b362ae4fe101db6870f021269a23a10d6f1301c86b2319d220cf568a6289c751e0c0098d57ff070615e9f21e6e71b281c016d42413122b787041d4b77e3bbabd945fd44eab70d205764e8a61420b"], 0x0, 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:32 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:32 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:32 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xae020000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:32 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x50020000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:32 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="18020000f2ffffff0000000000000000850000002c00000095000000000000003d789ade838a5ad00c21f97a9d6f55528c474cb385573d9f5ec0798d497a5d0ab93dbb637fd8de14970b4f76b599913ff77098a8cd276dee070239f048bff4c9d61b5c334ef7384130fd875789e46307b8f29c46149360bea59a42011aabb3125f93a06d27b6cf4f033c6000c3ab63ee03e9e7023574b86ce473bc8964c32f955d410083f7567775a2ca15dbbf01550310a78644e801f1753107cee250cb376879ae14b9e1ab98703bc7db41925c55b0a4141ae3c08d264831d0f6365469c356218500000000000000000000000000000000000000000000001a18f6de00bb8c95f8bdc2a54e6aefee88e5b1f6fdbc3a483235918073d11474cfa5d71d92c9bd2b72c3ce63d47075ae7c59d82cea1243db36970e2f56ae270cb56281877934e999394a7dfe2bb6a29394c82bfdffaedc4df6f74e8f286454fca6300d100e7eb8717c8528e445fbefe6a3139191529f22e4c0435e5c53e469f70c08bdff633307bbf119ffdb2e1d717eb268eea7322da5fda4fc19af52289d000f2dd88dda869c8a84dbc54c10bc7fee0486fa294b41c1d4dc44a9801c34ad96bbd834c7dd71160dfaf15a150d0a0b01a6168858b5d085a8b3ca5c3bd8534edc32c0bd1fdd112a1dc6f708cbe1a9432887e17fa9e6f63c1d86f6cec7b362ae4fe101db6870f021269a23a10d6f1301c86b2319d220cf568a6289c751e0c0098d57ff070615e9f21e6e71b281c016d42413122b787041d4b77e3bbabd945fd44eab70d205764e8a61420b"], 0x0, 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:32 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x0, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:32 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x50030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:32 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xb2010000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:32 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="18020000f2ffffff0000000000000000850000002c00000095000000000000003d789ade838a5ad00c21f97a9d6f55528c474cb385573d9f5ec0798d497a5d0ab93dbb637fd8de14970b4f76b599913ff77098a8cd276dee070239f048bff4c9d61b5c334ef7384130fd875789e46307b8f29c46149360bea59a42011aabb3125f93a06d27b6cf4f033c6000c3ab63ee03e9e7023574b86ce473bc8964c32f955d410083f7567775a2ca15dbbf01550310a78644e801f1753107cee250cb376879ae14b9e1ab98703bc7db41925c55b0a4141ae3c08d264831d0f6365469c356218500000000000000000000000000000000000000000000001a18f6de00bb8c95f8bdc2a54e6aefee88e5b1f6fdbc3a483235918073d11474cfa5d71d92c9bd2b72c3ce63d47075ae7c59d82cea1243db36970e2f56ae270cb56281877934e999394a7dfe2bb6a29394c82bfdffaedc4df6f74e8f286454fca6300d100e7eb8717c8528e445fbefe6a3139191529f22e4c0435e5c53e469f70c08bdff633307bbf119ffdb2e1d717eb268eea7322da5fda4fc19af52289d000f2dd88dda869c8a84dbc54c10bc7fee0486fa294b41c1d4dc44a9801c34ad96bbd834c7dd71160dfaf15a150d0a0b01a6168858b5d085a8b3ca5c3bd8534edc32c0bd1fdd112a1dc6f708cbe1a9432887e17fa9e6f63c1d86f6cec7b362ae4fe101db6870f021269a23a10d6f1301c86b2319d220cf568a6289c751e0c0098d57ff070615e9f21e6e71b281c016d42413122b787041d4b77e3bbabd945fd44eab70d205764e8a61420b"], &(0x7f0000000240)='syzkaller\x00', 0x0, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:33 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:33 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x0, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:33 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x52000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:33 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xb6010000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:33 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:34 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) [ 1995.629594][ T9395] __bpf_mt_check_bytecode: 16 callbacks suppressed [ 1995.645317][ T9397] xt_bpf: check failed: parse error [ 1995.661347][ T9395] xt_bpf: check failed: parse error 01:17:34 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xba010000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:34 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x52020000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:34 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) [ 1995.853217][ T9407] xt_bpf: check failed: parse error [ 1995.854242][ T9406] xt_bpf: check failed: parse error [ 1996.161161][ T9417] xt_bpf: check failed: parse error [ 1996.199047][ T9418] xt_bpf: check failed: parse error 01:17:35 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:35 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:35 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xba030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:35 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x58020000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:35 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 1997.027140][ T9424] xt_bpf: check failed: parse error [ 1997.034581][ T9425] xt_bpf: check failed: parse error 01:17:35 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xc0010000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:35 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x5a010000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) [ 1997.210147][ T9431] xt_bpf: check failed: parse error 01:17:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 01:17:35 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) [ 1997.251736][ T9435] xt_bpf: check failed: parse error 01:17:36 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[0xffffffffffffffff]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:36 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xc0020000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:36 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x60000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 01:17:36 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:36 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:36 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:36 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xc0030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:36 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x62010000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:38 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xc2030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 01:17:38 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x62020000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:38 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[0xffffffffffffffff]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:38 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="b4000000000b00007910000000000000c310000aa1000000950074000000000031fb0d3a42319fa204399d17d34e075fdcda533ab1aa71ab1d764152e6cb25dadc7ded5d05000000adea9fca11027d29066927603deb92de3141e8ed7ac5b8902070213cdfdc5d6c4890cdeb50347c2f060581172b94c6ba22a2b58eb6cbad46ed6e7965a2ba103b0b36f790bb41931f9a3d4dd127c1b4e49f7468f5e603950c4f67581c92ef8a7e8ece0000b9528454a057b5e6760808e8baf4c29861676e03bab49d5beadea592c048959303dfd62c46eac29e990747b62b9ea11385d59e5f60131dad5e782991cc922cfb97983a839d16b986ce8a939705aaf5a9443214f515c6026d0655d9efa6f49d6d9c8b6a59e34265019c90dbb4ef7c8fe90155436b571116d3b4bfc2d71b7a2a966a628549b1b8c46986d9ba8e0ace933a95"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:38 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 01:17:38 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x68000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:38 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xc6280000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:38 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 01:17:38 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="18020000f2ffffff0000000000000000850000002c00000095000000000000003d789ade838a5ad00c21f97a9d6f55528c474cb385573d9f5ec0798d497a5d0ab93dbb637fd8de14970b4f76b599913ff77098a8cd276dee070239f048bff4c9d61b5c334ef7384130fd875789e46307b8f29c46149360bea59a42011aabb3125f93a06d27b6cf4f033c6000c3ab63ee03e9e7023574b86ce473bc8964c32f955d410083f7567775a2ca15dbbf01550310a78644e801f1753107cee250cb376879ae14b9e1ab98703bc7db41925c55b0a4141ae3c08d264831d0f6365469c356218500000000000000000000000000000000000000000000001a18f6de00bb8c95f8bdc2a54e6aefee88e5b1f6fdbc3a483235918073d11474cfa5d71d92c9bd2b72c3ce63d47075ae7c59d82cea1243db36970e2f56ae270cb56281877934e999394a7dfe2bb6a29394c82bfdffaedc4df6f74e8f286454fca6300d100e7eb8717c8528e445fbefe6a3139191529f22e4c0435e5c53e469f70c08bdff633307bbf119ffdb2e1d717eb268eea7322da5fda4fc19af52289d000f2dd88dda869c8a84dbc54c10bc7fee0486fa294b41c1d4dc44a9801c34ad96bbd834c7dd71160dfaf15a150d0a0b01a6168858b5d085a8b3ca5c3bd8534edc32c0bd1fdd112a1dc6f708cbe1a9432887e17fa9e6f63c1d86f6cec7b362ae4fe101db6870f021269a23a10d6f1301c86b2319d220cf568a6289c751e0c0098d57ff070615e9f21e6e71b281c016d42413122b787041d4b77e3bbabd945fd44eab70d205764e8a61420b"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001900)={r0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 01:17:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:38 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x6c000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:38 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xca010000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:39 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[0xffffffffffffffff]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:39 executing program 4: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x52000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:39 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xca030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:39 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x70030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:39 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="b4000000000b00007910000000000000c310000aa1000000950074000000000031fb0d3a42319fa204399d17d34e075fdcda533ab1aa71ab1d764152e6cb25dadc7ded5d05000000adea9fca11027d29066927603deb92de3141e8ed7ac5b8902070213cdfdc5d6c4890cdeb50347c2f060581172b94c6ba22a2b58eb6cbad46ed6e7965a2ba103b0b36f790bb41931f9a3d4dd127c1b4e49f7468f5e603950c4f67581c92ef8a7e8ece0000b9528454a057b5e6760808e8baf4c29861676e03bab49d5beadea592c048959303dfd62c46eac29e990747b62b9ea11385d59e5f60131dad5e782991cc922cfb97983a839d16b986ce8a939705aaf5a9443214f515c6026d0655d9efa6f49d6d9c8b6a59e34265019c90dbb4ef7c8fe90155436b571116d3b4bfc2d71b7a2a966a628549b1b8c46986d9ba8e0ace933a95"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) [ 2001.301112][ T9512] __bpf_mt_check_bytecode: 16 callbacks suppressed [ 2001.301304][ T9512] xt_bpf: check failed: parse error [ 2001.308230][ T9514] xt_bpf: check failed: parse error [ 2001.325628][ T9515] xt_bpf: check failed: parse error 01:17:39 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x72030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000240)={'wlan1\x00'}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:39 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xd0000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) [ 2001.520801][ T9524] xt_bpf: check failed: parse error [ 2001.550260][ T9526] xt_bpf: check failed: parse error 01:17:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000240)={'wlan1\x00'}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) [ 2001.577330][ T9527] xt_bpf: check failed: parse error [ 2001.870833][ T9537] xt_bpf: check failed: parse error 01:17:40 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:40 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x74000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000240)={'wlan1\x00'}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:40 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xd2030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:40 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000240)={'wlan1\x00'}) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) accept4$alg(r0, 0x0, 0x0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) [ 2002.689283][ T9543] xt_bpf: check failed: parse error [ 2002.711680][ T9545] xt_bpf: check failed: parse error 01:17:41 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xd8020000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:41 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x75030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) [ 2002.831526][ T9549] xt_bpf: check failed: parse error 01:17:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) accept4$alg(r0, 0x0, 0x0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:42 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) accept4$alg(r0, 0x0, 0x0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:42 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xd8030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:42 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x78030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:42 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[0xffffffffffffffff]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:42 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xdc030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:42 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x79030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:43 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:43 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[0xffffffffffffffff]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:43 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x7a000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:43 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xde000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, 0x0, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:43 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x7a020000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:43 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xe0010000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, 0x0, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:45 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="b4000000000b00007910000000000000c310000aa1000000950074000000000031fb0d3a42319fa204399d17d34e075fdcda533ab1aa71ab1d764152e6cb25dadc7ded5d05000000adea9fca11027d29066927603deb92de3141e8ed7ac5b8902070213cdfdc5d6c4890cdeb50347c2f060581172b94c6ba22a2b58eb6cbad46ed6e7965a2ba103b0b36f790bb41931f9a3d4dd127c1b4e49f7468f5e603950c4f67581c92ef8a7e8ece0000b9528454a057b5e6760808e8baf4c29861676e03bab49d5beadea592c048959303dfd62c46eac29e990747b62b9ea11385d59e5f60131dad5e782991cc922cfb97983a839d16b986ce8a939705aaf5a9443214f515c6026d0655d9efa6f49d6d9c8b6a59e34265019c90dbb4ef7c8fe90155436b571116d3b4bfc2d71b7a2a966a628549b1b8c46986d9ba8e0ace933a95"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:45 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x7a030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:45 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xe4030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, 0x0, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:45 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[0xffffffffffffffff]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) [ 2006.703845][ T9625] __bpf_mt_check_bytecode: 15 callbacks suppressed [ 2006.707319][ T9625] xt_bpf: check failed: parse error 01:17:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) [ 2006.754805][ T9626] xt_bpf: check failed: parse error 01:17:45 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x7c010000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:45 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xe7000000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) [ 2006.858241][ T9630] xt_bpf: check failed: parse error 01:17:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) [ 2006.934998][ T9638] xt_bpf: check failed: parse error [ 2006.975905][ T9640] xt_bpf: check failed: parse error [ 2007.272068][ T9647] xt_bpf: check failed: parse error 01:17:46 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x80020000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:46 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xe8030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:17:46 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:46 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x80, 0x1, 0x80, 0x1, {{0x1c, 0x4, 0x1, 0x35, 0x70, 0x66, 0x0, 0x3f, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @loopback, {[@timestamp_prespec={0x44, 0x54, 0xb1, 0x3, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffffc}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x200}, {@remote, 0x7fffffff}, {@local, 0x5}, {@broadcast, 0x4}, {@private=0xa010101, 0x8}, {@loopback}, {@multicast1, 0xf04}, {@rand_addr=0x64010101, 0x400}, {@local, 0x96}]}, @generic={0xc8, 0x4, "e64b"}, @noop, @end]}}}}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x800000017fc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff7ffff, 0x0, 0x0, 0x0, 0x3f}, [@func={0x85, 0x0, 0x1, 0x0, 0x4000003}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0xcb, &(0x7f0000000340)=""/203, 0x40f00, 0xa, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0xf, 0x5, 0x6}, 0x10}, 0x80) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @dev}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001940)={0x11, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf07a, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f00000007c0)=""/4096, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0xe, 0x200, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r5]}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r10 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) ioctl$F2FS_IOC_MOVE_RANGE(r10, 0xc020f509, &(0x7f0000000700)={r4, 0x7fffffff, 0x1, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='cachefiles_lookup\x00', r9}, 0x10) recvmmsg(r7, &(0x7f00000005c0)=[{{0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}}], 0x4000000000001db, 0x0, 0x0) sendfile(r7, r6, 0x0, 0xffefffff) 01:17:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) 01:17:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crct10dif-generic)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x8}, 0xe803) sendmsg$NL80211_CMD_SET_POWER_SAVE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16, @ANYBLOB="04002dbd7000fedbdf253d00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900f40500004c00000008005d000000000008005d000000000002005d000100000008005d000100000008005d0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x81}, 0x41) [ 2008.090839][ T9655] xt_bpf: check failed: parse error [ 2008.095371][ T9654] xt_bpf: check failed: parse error 01:17:46 executing program 5: socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0x86030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) 01:17:46 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xea030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) [ 2008.207758][ T9659] xt_bpf: check failed: parse error [ 2008.223430][ T7] general protection fault, probably for non-canonical address 0xdffffc0000000004: 0000 [#1] PREEMPT SMP KASAN [ 2008.235506][ T7] KASAN: null-ptr-deref in range [0x0000000000000020-0x0000000000000027] [ 2008.244396][ T7] CPU: 0 PID: 7 Comm: kworker/0:0 Not tainted 6.4.0-rc6-syzkaller-01339-g4931062492c5 #0 [ 2008.254361][ T7] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 2008.261139][ T9665] xt_bpf: check failed: parse error [ 2008.264943][ T7] Workqueue: cryptd cryptd_queue_worker [ 2008.264983][ T7] RIP: 0010:crypto_shash_finup+0x53/0x160 [ 2008.282818][ T7] Code: fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 05 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 8b 5d 00 48 8d 7b 20 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 d8 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b 01:17:46 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xec030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) [ 2008.303057][ T7] RSP: 0018:ffffc900000c7ba0 EFLAGS: 00010202 [ 2008.309235][ T7] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 2008.317237][ T7] RDX: 0000000000000004 RSI: ffffffff83df4cdf RDI: 0000000000000020 [ 2008.325228][ T7] RBP: ffff88802e067308 R08: 0000000000000005 R09: 0000000000000000 [ 2008.333994][ T7] R10: 0000000000000000 R11: 0000000000000000 R12: ffff888059d220c0 [ 2008.342669][ T7] R13: ffff88804297ef28 R14: 0000000000000050 R15: 0000000000000000 [ 2008.350655][ T7] FS: 0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 [ 2008.361083][ T7] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2008.367688][ T7] CR2: 0000000020000000 CR3: 000000002a3e2000 CR4: 00000000003506f0 [ 2008.375681][ T7] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2008.383672][ T7] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2008.391835][ T7] Call Trace: [ 2008.395228][ T7] [ 2008.398169][ T7] ? die_addr+0x3c/0xa0 [ 2008.402376][ T7] ? exc_general_protection+0x129/0x230 01:17:46 executing program 3: socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x480, 0x318, 0x11, 0x148, 0x0, 0x10, 0x3e8, 0x2a8, 0x2a8, 0x3e8, 0x2a8, 0xac, 0x0, {[{{@uncond, 0x10, 0x2f8, 0x318, 0x1c, {0xed030000}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x30, './file0\x00'}}]}, @unspec=@TRACE={0x20}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_batadv\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4e0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) [ 2008.408053][ T7] ? asm_exc_general_protection+0x26/0x30 [ 2008.413801][ T7] ? crypto_shash_finup+0x1f/0x160 [ 2008.418948][ T7] ? crypto_shash_finup+0x53/0x160 [ 2008.424084][ T7] shash_ahash_finup+0xdf/0x3a0 [ 2008.428965][ T7] ? shash_async_setkey+0x240/0x240 [ 2008.434193][ T7] ? mark_held_locks+0x9f/0xe0 [ 2008.438993][ T7] cryptd_hash_finup+0xce/0x120 [ 2008.443868][ T7] ? cryptd_hash_digest+0x1a0/0x1a0 [ 2008.449087][ T7] cryptd_queue_worker+0x130/0x1d0 [ 2008.454224][ T7] process_one_work+0x99a/0x15e0 [ 2008.459200][ T7] ? pwq_dec_nr_in_flight+0x2a0/0x2a0 [ 2008.464608][ T7] ? spin_bug+0x1c0/0x1c0 [ 2008.468985][ T7] ? _raw_spin_lock_irq+0x45/0x50 [ 2008.474048][ T7] worker_thread+0x67d/0x10c0 [ 2008.478762][ T7] ? process_one_work+0x15e0/0x15e0 [ 2008.483993][ T7] kthread+0x344/0x440 [ 2008.488087][ T7] ? kthread_complete_and_exit+0x40/0x40 [ 2008.494793][ T7] ret_from_fork+0x1f/0x30 [ 2008.499277][ T7] [ 2008.502302][ T7] Modules linked in: [ 2008.554856][ T7] ---[ end trace 0000000000000000 ]--- [ 2008.560395][ T7] RIP: 0010:crypto_shash_finup+0x53/0x160 [ 2008.581801][ T7] Code: fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 05 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 8b 5d 00 48 8d 7b 20 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 d8 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b [ 2008.615903][ T7] RSP: 0018:ffffc900000c7ba0 EFLAGS: 00010202 [ 2008.622715][ T7] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 2008.633332][ T7] RDX: 0000000000000004 RSI: ffffffff83df4cdf RDI: 0000000000000020 [ 2008.641630][ T7] RBP: ffff88802e067308 R08: 0000000000000005 R09: 0000000000000000 [ 2008.649625][ T7] R10: 0000000000000000 R11: 0000000000000000 R12: ffff888059d220c0 [ 2008.658275][ T7] R13: ffff88804297ef28 R14: 0000000000000050 R15: 0000000000000000 [ 2008.668595][ T7] FS: 0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 [ 2008.677901][ T7] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2008.684977][ T7] CR2: 00007f2c741831b8 CR3: 00000000298b2000 CR4: 00000000003506f0 [ 2008.695286][ T7] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2008.704064][ T7] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2008.712338][ T7] Kernel panic - not syncing: Fatal exception [ 2008.719108][ T7] Kernel Offset: disabled [ 2008.723429][ T7] Rebooting in 86400 seconds..