roblems! [ 1848.607730] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1848.618341] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1848.628033] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1848.638418] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1848.648157] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1848.658736] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1848.668576] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1848.678863] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1848.690578] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1848.698564] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1848.707022] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1848.716056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 21:33:10 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000"/1248], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1b4, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:10 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:10 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) flock(r0, 0x1) 21:33:10 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x0, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:10 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:10 executing program 0: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0xfffa, 0x1, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x2, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a05"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:11 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) flock(0xffffffffffffffff, 0x1) 21:33:11 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000"/1248], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1b4, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:11 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) flock(0xffffffffffffffff, 0x1) 21:33:11 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x0, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:11 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000"/1248], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1b4, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:11 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) flock(0xffffffffffffffff, 0x1) 21:33:11 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:11 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800"/1268], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1b4, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:11 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) flock(0xffffffffffffffff, 0x1) 21:33:11 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:11 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800"/1268], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1b4, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:12 executing program 0: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0xfffa, 0x1, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x2, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3e"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:12 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:12 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) flock(0xffffffffffffffff, 0x1) 21:33:12 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800"/1268], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1b4, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:12 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:12 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) flock(0xffffffffffffffff, 0x1) 21:33:12 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800"/1278], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1b4, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:12 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3100"/644], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:12 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:12 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) flock(r0, 0x0) 21:33:12 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800"/1268], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1b4, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:12 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800"/1278], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1b4, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:13 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="e14e4129cbc07f77a1ae4ef335ccc205050122e409c50e8bc393000414c3cfd56f922858e597e7aed6d83605ccbad0afa16ff30600f7ffffff0625f0f45e37900e5c1c998de8f79949f45fbcaeeeffff00000000000000000000000000000024654c2a334116210128065cb43ad59a05c112b01f2a52299f1de750e651d033a3ce950fcee7d079ddf9bf3cb41e9d089ef0c76e66a3abcdbf36f5b53e752ee4347641635bb245287595b3e818238236d7ab593998e585f79544217d5ec5f305651c675939c3a68a683294647fb7c90e81f6334d7ebd983e218a0b8d8d93557c3b27d37f32c427780c3832122cbf92b69bd3a2fd23c2d913e6f71e545739", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:13 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) flock(r0, 0x0) 21:33:13 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x3, 0x1) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x8, 0x8, 0xff}) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x400000000000064, 0x0) 21:33:13 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800"/1278], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1b4, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:13 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3100"/644], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 21:33:13 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffff"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1b4, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:13 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) flock(r0, 0x0) 21:33:13 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0x0, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:13 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffff"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1b4, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:13 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3100"/644], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:13 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 21:33:13 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0x0, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 21:33:14 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffff"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1b4, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:14 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000180100"/966], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:14 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0x0, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="e14e4129cbc07f77a1ae4ef335ccc205050122e409c50e8bc393000414c3cfd56f922858e597e7aed6d83605ccbad0afa16ff30600f7ffffff0625f0f45e37900e5c1c998de8f79949f45fbcaeeeffff00000000000000000000000000000024654c2a334116210128065cb43ad59a05c112b01f2a52299f1de750e651d033a3ce950fcee7d079ddf9bf3cb41e9d089ef0c76e66a3abcdbf36f5b53e752ee4347641635bb245287595b3e818238236d7ab593998e585f79544217d5ec5f305651c675939c3a68a683294647fb7c90e81f6334d7ebd983e218a0b8d8d93557c3b27d37f32c427780c3832122cbf92b69bd3a2fd23c2d913e6f71e545739", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:14 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1b4, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:14 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x5, @mcast2, 0x9}, 0x1c) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x1) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000000)=0x3, 0x4) sched_yield() sendto$unix(0xffffffffffffffff, &(0x7f0000000180)="a1040e9f422aba83a6b791fd2a4cdb8495650d82a32883ab8cba87a19f0447e8402d94b516b8b3d8036c6cd2c12296fcc5dd736c0d92a4", 0x37, 0x4002, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) read$char_usb(r1, &(0x7f00000000c0)=""/169, 0xa9) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) accept4$inet(r2, &(0x7f0000000280)={0x2, 0x0, @initdev}, &(0x7f00000002c0)=0x10, 0x80000) 21:33:14 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000180100"/966], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:14 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0x0, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:14 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1b4, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1853.330214] xt_TCPMSS: Only works on TCP SYN packets 21:33:14 executing program 0: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:14 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1b4, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1853.477947] xt_TCPMSS: Only works on TCP SYN packets [ 1853.743116] xt_TCPMSS: Only works on TCP SYN packets 21:33:15 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0xfffa, 0x1, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x2, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a056642cdf0dcd4405dc0f029ccaf108b18d2d7dcc6fa70bcb7b3d0063384a57fd0edf8b28e4b56fc004b6e93700098"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:15 executing program 5: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:15 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:15 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1b4, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:15 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000180100"/966], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:15 executing program 0: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0xfffa, 0x1, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x2, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a056642cdf0dcd4405dc0f029ccaf108b18d2d7dcc6fa70bcb7b3d0063384a57fd0edf8b28e4b56fc004b6e93700098"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:15 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100"/1127], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:15 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1b4, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1854.374758] xt_TCPMSS: Only works on TCP SYN packets [ 1854.679892] xt_TCPMSS: Only works on TCP SYN packets 21:33:15 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1b4, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:16 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="e14e4129cbc07f77a1ae4ef335ccc205050122e409c50e8bc393000414c3cfd56f922858e597e7aed6d83605ccbad0afa16ff30600f7ffffff0625f0f45e37900e5c1c998de8f79949f45fbcaeeeffff00000000000000000000000000000024654c2a334116210128065cb43ad59a05c112b01f2a52299f1de750e651d033a3ce950fcee7d079ddf9bf3cb41e9d089ef0c76e66a3abcdbf36f5b53e752ee4347641635bb245287595b3e818238236d7ab593998e585f79544217d5ec5f305651c675939c3a68a683294647fb7c90e81f6334d7ebd983e218a0b8d8d93557c3b27d37f32c427780c3832122cbf92b69bd3a2fd23c2d913e6f71e545739", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:16 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100"/1127], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1855.073569] xt_TCPMSS: Only works on TCP SYN packets 21:33:16 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1855.429928] xt_TCPMSS: Only works on TCP SYN packets 21:33:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:16 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100"/1127], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:16 executing program 5: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0xfffa, 0x1, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x2, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a056642cdf0dcd4405dc0f029ccaf108b18d2d7dcc6fa70bcb7b3d0063384a57fd0edf8b28e4b56fc004b6e93700098"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:16 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:16 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 21:33:16 executing program 0: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0xfffa, 0x1, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x2, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), 0x0, 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a056642cdf0dcd4405dc0f029ccaf108b18d2d7dcc6fa70bcb7b3d0063384a57fd0edf8b28e4b56fc004b6e93700098"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:17 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 1855.941314] xt_TCPMSS: Only works on TCP SYN packets [ 1856.233806] xt_TCPMSS: Only works on TCP SYN packets 21:33:17 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 21:33:17 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100"/1208], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:17 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:17 executing program 2: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000), 0x0, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(0xffffffffffffffff, 0x0, 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) [ 1856.506744] xt_TCPMSS: Only works on TCP SYN packets 21:33:17 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:18 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:18 executing program 5: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0xfffa, 0x1, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x2, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a056642cdf0dcd4405dc0f029ccaf108b18d2d7dcc6fa70bcb7b3d0063384a57fd0edf8b28e4b56fc004b6e93700098"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:18 executing program 2: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:18 executing program 0: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0xfffa, 0x1, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x2, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), 0x0, 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a056642cdf0dcd4405dc0f029ccaf108b18d2d7dcc6fa70bcb7b3d0063384a57fd0edf8b28e4b56fc004b6e93700098"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:18 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:18 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100"/1208], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:19 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100"/1208], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:19 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:19 executing program 5: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000), 0x0, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a056642cdf0dcd4405dc0f029ccaf108b18d2d7dcc6fa70bcb7b3d0063384a57fd0edf8b28e4b56fc004b6e93700098"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:19 executing program 2: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000), 0x0, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a056642cdf0dcd4405dc0f029ccaf108b18d2d7dcc6fa70bcb7b3d0063384a57fd0edf8b28e4b56fc004b6e93700098"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:19 executing program 0: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:19 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:19 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0xfffa, 0x1, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x2, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a056642cdf0dcd4405dc0f029ccaf108b18d2d7dcc6fa70bcb7b3d0063384a57fd0edf8b28e4b56fc004b6e93700098"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:20 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000"/1248], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:20 executing program 5: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:20 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:20 executing program 2: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000), 0x0, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a056642cdf0dcd4405dc0f029ccaf108b18d2d7dcc6fa70bcb7b3d0063384a57fd0edf8b28e4b56fc004b6e93700098"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:20 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000"/1248], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:20 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:20 executing program 0: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:20 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:20 executing program 2: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0xfffa, 0x1, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x2, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a056642cdf0dcd4405dc0f029ccaf108b18d2d7dcc6fa70bcb7b3d0063384a57fd0edf8b28e4b56fc004b6e93700098"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:20 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000"/1248], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:21 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:21 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800"/1268], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:21 executing program 5: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000), 0x0, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a056642cdf0dcd4405dc0f029ccaf108b18d2d7dcc6fa70bcb7b3d0063384a57fd0edf8b28e4b56fc004b6e93700098"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:21 executing program 2: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:22 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:22 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:22 executing program 5: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0xfffa, 0x1, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x2, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{0x0}], 0x1, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a056642cdf0dcd4405dc0f029ccaf108b18d2d7dcc6fa70bcb7b3d0063384a57fd0edf8b28e4b56fc004b6e93700098"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:22 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800"/1268], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:22 executing program 0: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0xfffa, 0x1, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x2, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{0x0}], 0x1, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a056642cdf0dcd4405dc0f029ccaf108b18d2d7dcc6fa70bcb7b3d0063384a57fd0edf8b28e4b56fc004b6e93700098"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:22 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:22 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800"/1268], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:22 executing program 2: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0xfffa, 0x1, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x2, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{0x0}], 0x1, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a056642cdf0dcd4405dc0f029ccaf108b18d2d7dcc6fa70bcb7b3d0063384a57fd0edf8b28e4b56fc004b6e93700098"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:22 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:22 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800"/1278], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:23 executing program 0: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000), 0x0, &(0x7f0000121000), 0x0, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a056642cdf0dcd4405dc0f029ccaf108b18d2d7dcc6fa70bcb7b3d0063384a57fd0edf8b28e4b56fc004b6e93700098"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:23 executing program 5: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0xfffa, 0x1, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x2, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{0x0}], 0x1, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a056642cdf0dcd4405dc0f029ccaf108b18d2d7dcc6fa70bcb7b3d0063384a57fd0edf8b28e4b56fc004b6e93700098"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:23 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:23 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:23 executing program 2: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:23 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800"/1278], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:23 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="e14e4129cbc07f77a1ae4ef335ccc205050122e409c50e8bc393000414c3cfd56f922858e597e7aed6d83605ccbad0afa16ff30600f7ffffff0625f0f45e37900e5c1c998de8f79949f45fbcaeeeffff00000000000000000000000000000024654c2a334116210128065cb43ad59a05c112b01f2a52299f1de750e651d033a3ce950fcee7d079ddf9bf3cb41e9d089ef0c76e66a3abcdbf36f5b53e752ee4347641635bb245287595b3e818238236d7ab593998e585f79544217d5ec5f305651c675939c3a68a683294647fb7c90e81f6334d7ebd983e218a0b8d8d93557c3b27d37f32c427780c3832122cbf92b69bd3a2fd23c2d913e6f71e545739", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:23 executing program 0: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0xfffa, 0x1, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x2, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000), 0x0, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a056642cdf0dcd4405dc0f029ccaf108b18d2d7dcc6fa70bcb7b3d0063384a57fd0edf8b28e4b56fc004b6e93700098"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:23 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800"/1278], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:23 executing program 5: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0xfffa, 0x1, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x2, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a056642cdf0dcd4405dc0f029ccaf108b18d2d7dcc6fa70bcb7b3d0063384a57fd0edf8b28e4b56fc004b6e93700098"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:23 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:24 executing program 0: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0xfffa, 0x1, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x2, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a056642cdf0dcd4405dc0f029ccaf108b18d2d7dcc6fa70bcb7b3d0063384a57fd0edf8b28e4b56fc004b6e93700098"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:24 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:24 executing program 5: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0xfffa, 0x1, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x2, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a056642cdf0dcd4405dc0f029ccaf108b18d2d7dcc6fa70bcb7b3d0063384a57fd0edf8b28e4b56fc004b6e93700098"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:24 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffff"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:24 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:24 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:24 executing program 0: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0xfffa, 0x1, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x2, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a056642cdf0dcd4405dc0f029ccaf108b18d2d7dcc6fa70bcb7b3d0063384a57fd0edf8b28e4b56fc004b6e93700098"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:24 executing program 2: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0xfffa, 0x1, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x2, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a056642cdf0dcd4405dc0f029ccaf108b18d2d7dcc6fa70bcb7b3d0063384a57fd0edf8b28e4b56fc004b6e93700098"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:24 executing program 5: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0xfffa, 0x1, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x2, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a056642cdf0dcd4405dc0f029ccaf108b18d2d7dcc6fa70bcb7b3d0063384a57fd0edf8b28e4b56fc004b6e93700098"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:24 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffff"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:25 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:25 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffff"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:25 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffff"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:25 executing program 2: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:25 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:25 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffff"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:25 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/input/mice\x00', 0x48180) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000100)) 21:33:25 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="e14e4129cbc07f77a1ae4ef335ccc205050122e409c50e8bc393000414c3cfd56f922858e597e7aed6d83605ccbad0afa16ff30600f7ffffff0625f0f45e37900e5c1c998de8f79949f45fbcaeeeffff00000000000000000000000000000024654c2a334116210128065cb43ad59a05c112b01f2a52299f1de750e651d033a3ce950fcee7d079ddf9bf3cb41e9d089ef0c76e66a3abcdbf36f5b53e752ee4347641635bb245287595b3e818238236d7ab593998e585f79544217d5ec5f305651c675939c3a68a683294647fb7c90e81f6334d7ebd983e218a0b8d8d93557c3b27d37f32c427780c3832122cbf92b69bd3a2fd23c2d913e6f71e545739", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:25 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:26 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffff"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1864.980344] xt_TCPMSS: Only works on TCP SYN packets 21:33:26 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:26 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1865.243306] xt_TCPMSS: Only works on TCP SYN packets 21:33:26 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:26 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1865.579839] xt_TCPMSS: Only works on TCP SYN packets [ 1865.664246] xt_TCPMSS: Only works on TCP SYN packets 21:33:26 executing program 2: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0xfffa, 0x1, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x2, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000), 0x0, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a056642cdf0dcd4405dc0f029ccaf108b18d2d7dcc6fa70bcb7b3d0063384a57fd0edf8b28e4b56fc004b6e93700098"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:26 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:26 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:27 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:27 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/input/mice\x00', 0x48180) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000100)) 21:33:27 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:27 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1865.892887] xt_TCPMSS: Only works on TCP SYN packets 21:33:27 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1866.017092] xt_TCPMSS: Only works on TCP SYN packets [ 1866.025183] xt_TCPMSS: Only works on TCP SYN packets 21:33:27 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1866.234246] xt_TCPMSS: Only works on TCP SYN packets 21:33:27 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:27 executing program 0: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) [ 1866.293145] xt_TCPMSS: Only works on TCP SYN packets 21:33:27 executing program 2: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:27 executing program 5: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1866.626205] xt_TCPMSS: Only works on TCP SYN packets 21:33:28 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:28 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 21:33:28 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="e14e4129cbc07f77a1ae4ef335ccc205050122e409c50e8bc393000414c3cfd56f922858e597e7aed6d83605ccbad0afa16ff30600f7ffffff0625f0f45e37900e5c1c998de8f79949f45fbcaeeeffff00000000000000000000000000000024654c2a334116210128065cb43ad59a05c112b01f2a52299f1de750e651d033a3ce950fcee7d079ddf9bf3cb41e9d089ef0c76e66a3abcdbf36f5b53e752ee4347641635bb245287595b3e818238236d7ab593998e585f79544217d5ec5f305651c675939c3a68a683294647fb7c90e81f6334d7ebd983e218a0b8d8d93557c3b27d37f32c427780c3832122cbf92b69bd3a2fd23c2d913e6f71e545739", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1867.278889] xt_TCPMSS: Only works on TCP SYN packets 21:33:28 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 21:33:28 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:28 executing program 0: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) [ 1867.716622] xt_TCPMSS: Only works on TCP SYN packets 21:33:28 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 21:33:29 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:29 executing program 2: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:29 executing program 5: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) [ 1867.955592] xt_TCPMSS: Only works on TCP SYN packets 21:33:29 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:29 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:29 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 1868.726251] xt_TCPMSS: Only works on TCP SYN packets 21:33:29 executing program 1: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0xfffa, 0x1, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x2, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a056642cdf0dcd4405dc0f029ccaf108b18d2d7dcc6fa70bcb7b3d0063384a57fd0edf8b28e4b56fc004b6e93700098"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:30 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:30 executing program 2: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0xfffa, 0x1, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x2, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a056642cdf0dcd4405dc0f029ccaf108b18d2d7dcc6fa70bcb7b3d0063384a57fd0edf8b28e4b56fc004b6e93700098"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:30 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:30 executing program 0: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:30 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="e14e4129cbc07f77a1ae4ef335ccc205050122e409c50e8bc393000414c3cfd56f922858e597e7aed6d83605ccbad0afa16ff30600f7ffffff0625f0f45e37900e5c1c998de8f79949f45fbcaeeeffff00000000000000000000000000000024654c2a334116210128065cb43ad59a05c112b01f2a52299f1de750e651d033a3ce950fcee7d079ddf9bf3cb41e9d089ef0c76e66a3abcdbf36f5b53e752ee4347641635bb245287595b3e818238236d7ab593998e585f79544217d5ec5f305651c675939c3a68a683294647fb7c90e81f6334d7ebd983e218a0b8d8d93557c3b27d37f32c427780c3832122cbf92b69bd3a2fd23c2d913e6f71e545739", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:30 executing program 5: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0xfffa, 0x1, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x2, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a056642cdf0dcd4405dc0f029ccaf108b18d2d7dcc6fa70bcb7b3d0063384a57fd0edf8b28e4b56fc004b6e93700098"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:31 executing program 1: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0xfffa, 0x1, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x2, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a056642cdf0dcd4405dc0f029ccaf108b18d2d7dcc6fa70bcb7b3d0063384a57fd0edf8b28e4b56fc004b6e93700098"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:31 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:31 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:31 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$FICLONE(r1, 0x40049409, r1) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 21:33:32 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:32 executing program 5: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0xfffa, 0x1, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x2, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a056642cdf0dcd4405dc0f029ccaf108b18d2d7dcc6fa70bcb7b3d0063384a57fd0edf8b28e4b56fc004b6e93700098"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:32 executing program 1: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0xfffa, 0x1, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x2, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a056642cdf0dcd4405dc0f029ccaf108b18d2d7dcc6fa70bcb7b3d0063384a57fd0edf8b28e4b56fc004b6e93700098"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mISDNtimer\x00', 0x10000, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, &(0x7f0000000000)={0x0, 0x8, 0x9, 0x7047, 0xa5a6, 0x5, 0x800, 0x200, 0x10000, 0x10001, 0xff, 0x10000}) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup(r7) ioctl$VIDIOC_QBUF(r4, 0xc058560f, &(0x7f0000000180)={0x0, 0x3, 0x4, 0x20000000, 0x0, {r5, r6/1000+10000}, {0x3, 0x0, 0x0, 0x7, 0x3, 0x1f, "ee11589b"}, 0xdd6, 0x1, @offset=0x5d66, 0x0, 0x0, r7}) write$RDMA_USER_CM_CMD_BIND_IP(r8, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x80, @loopback, 0x101}}}, 0x30) 21:33:32 executing program 0: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0xfffa, 0x1, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x2, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a056642cdf0dcd4405dc0f029ccaf108b18d2d7dcc6fa70bcb7b3d0063384a57fd0edf8b28e4b56fc004b6e93700098"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:32 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:32 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:32 executing program 2: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:32 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:32 executing program 5: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:32 executing program 0: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0xfffa, 0x1, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x2, 0x0, 0xffffffff, 0x5f1}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffff7c6d017ceb80813794f78ee35540c77999763d9fa6ddbec1a278788e29d4343179b846438bc3654107bef74c36fc8572be6a710ca51240afd788772acde8772d1c90a895595be5108bc49fcd560638ea353c1e33fabb3efa1d5f11596a1615467bb06a6bbc77fcef3fde901361641ad13db6e539508df287a3ade93a902061749143e60a056642cdf0dcd4405dc0f029ccaf108b18d2d7dcc6fa70bcb7b3d0063384a57fd0edf8b28e4b56fc004b6e93700098"], 0x9e) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:33 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:33 executing program 1 (fault-call:8 fault-nth:0): openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1872.405419] xt_TCPMSS: Only works on TCP SYN packets 21:33:33 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r1, 0xc080661a, &(0x7f0000000080)={{0x1, 0x0, @descriptor="2ff155ead4d70395"}}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) timerfd_gettime(r4, &(0x7f0000000180)) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10402, 0xda) 21:33:33 executing program 0 (fault-call:9 fault-nth:0): openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1872.436721] FAULT_INJECTION: forcing a failure. [ 1872.436721] name failslab, interval 1, probability 0, space 0, times 0 [ 1872.530353] CPU: 0 PID: 25299 Comm: syz-executor.1 Not tainted 4.14.180-syzkaller #0 [ 1872.538367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1872.547726] Call Trace: [ 1872.550322] dump_stack+0x13e/0x194 [ 1872.553966] should_fail.cold+0x10a/0x14b [ 1872.558133] should_failslab+0xd6/0x130 [ 1872.562119] kmem_cache_alloc_node+0x288/0x7a0 [ 1872.566708] ? find_held_lock+0x2d/0x110 [ 1872.570785] ? get_pid_task+0x91/0x130 [ 1872.574692] copy_process.part.0+0x17d5/0x6a50 [ 1872.579382] ? get_pid_task+0xb8/0x130 [ 1872.583285] ? proc_fail_nth_write+0x7b/0x180 [ 1872.587791] ? check_preemption_disabled+0x35/0x240 [ 1872.592823] ? perf_trace_lock+0x109/0x4b0 [ 1872.597092] ? save_trace+0x290/0x290 [ 1872.600996] ? __cleanup_sighand+0x40/0x40 [ 1872.605239] ? vfs_write+0x25b/0x4e0 [ 1872.608971] _do_fork+0x180/0xc80 [ 1872.612443] ? fork_idle+0x270/0x270 [ 1872.616162] ? SyS_write+0x14d/0x210 [ 1872.619881] ? SyS_read+0x210/0x210 [ 1872.623510] ? __do_page_fault+0x35b/0xb40 21:33:33 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1872.627747] ? do_syscall_64+0x4c/0x640 [ 1872.631722] ? sys_vfork+0x20/0x20 [ 1872.635266] do_syscall_64+0x1d5/0x640 [ 1872.639166] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1872.644360] RIP: 0033:0x45c829 [ 1872.647547] RSP: 002b:00007f3376f41c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1872.655261] RAX: ffffffffffffffda RBX: 00000000004da960 RCX: 000000000045c829 [ 1872.662541] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1872.669819] RBP: 000000000078bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 1872.677101] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1872.684376] R13: 0000000000000076 R14: 00000000004c311e R15: 00007f3376f426d4 [ 1872.734814] xt_TCPMSS: Only works on TCP SYN packets [ 1872.853499] xt_TCPMSS: Only works on TCP SYN packets 21:33:34 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d80003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000013000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000000000cc83401118f5617f2010cba375873e0a849e7173f29214c623b6f0e5637082d94e6b9cbca52c305d0e8c17da78e28561efb3"], 0x508) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080)={0xfff, 0x3f, 0x2, 0x1, 0x2, 0x2, 0xb36e, 0x100}, &(0x7f00000000c0)=0x20) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1872.937327] FAULT_INJECTION: forcing a failure. [ 1872.937327] name failslab, interval 1, probability 0, space 0, times 0 [ 1873.000949] CPU: 0 PID: 25311 Comm: syz-executor.0 Not tainted 4.14.180-syzkaller #0 [ 1873.008885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1873.018259] Call Trace: [ 1873.020864] dump_stack+0x13e/0x194 [ 1873.024515] should_fail.cold+0x10a/0x14b [ 1873.028691] should_failslab+0xd6/0x130 [ 1873.032691] kmem_cache_alloc_node+0x288/0x7a0 [ 1873.037286] ? find_held_lock+0x2d/0x110 [ 1873.041359] ? get_pid_task+0x91/0x130 [ 1873.045268] copy_process.part.0+0x17d5/0x6a50 [ 1873.049861] ? check_preemption_disabled+0x35/0x240 [ 1873.054895] ? perf_trace_lock+0x109/0x4b0 [ 1873.059154] ? save_trace+0x290/0x290 [ 1873.063493] ? SOFTIRQ_verbose+0x10/0x10 [ 1873.067570] ? perf_trace_lock+0x109/0x4b0 [ 1873.071824] ? find_held_lock+0x2d/0x110 [ 1873.075920] ? __cleanup_sighand+0x40/0x40 [ 1873.080171] ? lock_downgrade+0x6e0/0x6e0 [ 1873.084340] _do_fork+0x180/0xc80 [ 1873.087810] ? fork_idle+0x270/0x270 [ 1873.091539] ? fput+0xb/0x140 [ 1873.094665] ? SyS_write+0x14d/0x210 [ 1873.098389] ? SyS_read+0x210/0x210 [ 1873.102037] ? SyS_clock_settime+0x1a0/0x1a0 [ 1873.106457] ? do_syscall_64+0x4c/0x640 [ 1873.110442] ? sys_vfork+0x20/0x20 [ 1873.113993] do_syscall_64+0x1d5/0x640 [ 1873.117896] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1873.123095] RIP: 0033:0x45c829 [ 1873.126292] RSP: 002b:00007fece32a0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1873.134054] RAX: ffffffffffffffda RBX: 00000000004da960 RCX: 000000000045c829 [ 1873.141334] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1873.148697] RBP: 000000000078bf00 R08: ffffffffffffffff R09: 0000000000000000 [ 1873.155971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1873.163254] R13: 0000000000000076 R14: 00000000004c311e R15: 00007fece32a16d4 21:33:34 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:34 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioperm(0x7, 0x0, 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1873.355508] xt_TCPMSS: Only works on TCP SYN packets [ 1873.458086] xt_TCPMSS: Only works on TCP SYN packets 21:33:34 executing program 2 (fault-call:9 fault-nth:0): creat(0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x164142, 0x0) sendfile(r2, r3, 0x0, 0x80001d00c0d0) 21:33:34 executing program 0 (fault-call:9 fault-nth:1): openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:34 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:34 executing program 5 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) flock(r0, 0x1) [ 1873.582211] xt_TCPMSS: Only works on TCP SYN packets 21:33:34 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d80300000300000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00"/1282], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$isdn(r2, &(0x7f0000000080)={0x5, 0x5}, 0x8, 0x24040844, &(0x7f00000000c0)={0x22, 0x0, 0x7, 0x1c, 0x9}, 0x6) r3 = dup(0xffffffffffffffff) semop(0x0, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x2, 0x13, &(0x7f0000000140)=""/30) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) preadv(r3, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1873.760228] FAULT_INJECTION: forcing a failure. [ 1873.760228] name failslab, interval 1, probability 0, space 0, times 0 [ 1873.798876] FAULT_INJECTION: forcing a failure. [ 1873.798876] name failslab, interval 1, probability 0, space 0, times 0 [ 1873.848887] CPU: 1 PID: 25346 Comm: syz-executor.2 Not tainted 4.14.180-syzkaller #0 [ 1873.856806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1873.866169] Call Trace: [ 1873.868774] dump_stack+0x13e/0x194 [ 1873.872427] should_fail.cold+0x10a/0x14b [ 1873.876598] should_failslab+0xd6/0x130 [ 1873.880595] kmem_cache_alloc_trace+0x2db/0x7b0 [ 1873.885281] ? __lock_is_held+0xad/0x140 [ 1873.889371] alloc_pipe_info+0xaa/0x380 [ 1873.893371] splice_direct_to_actor+0x581/0x730 [ 1873.898056] ? avc_policy_seqno+0x5/0x10 [ 1873.902130] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1873.906988] ? do_splice_to+0x150/0x150 [ 1873.910995] ? rw_verify_area+0xe1/0x2a0 [ 1873.915071] do_splice_direct+0x164/0x210 [ 1873.919234] ? splice_direct_to_actor+0x730/0x730 [ 1873.924095] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1873.929123] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 1873.933895] do_sendfile+0x469/0xaf0 [ 1873.937633] ? do_compat_pwritev64+0x140/0x140 [ 1873.942235] SyS_sendfile64+0xff/0x110 [ 1873.946130] ? SyS_sendfile+0x130/0x130 [ 1873.950294] ? do_syscall_64+0x4c/0x640 [ 1873.954341] ? SyS_sendfile+0x130/0x130 [ 1873.958326] do_syscall_64+0x1d5/0x640 [ 1873.962235] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1873.967438] RIP: 0033:0x45c829 [ 1873.970634] RSP: 002b:00007f44839f5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1873.978554] RAX: ffffffffffffffda RBX: 00000000004fc2e0 RCX: 000000000045c829 [ 1873.985834] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 1873.993117] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1874.000565] R10: 000080001d00c0d0 R11: 0000000000000246 R12: 0000000000000005 [ 1874.008048] R13: 00000000000008dc R14: 00000000004cb816 R15: 00007f44839f66d4 [ 1874.015951] CPU: 0 PID: 25343 Comm: syz-executor.5 Not tainted 4.14.180-syzkaller #0 [ 1874.024546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1874.034063] Call Trace: [ 1874.036676] dump_stack+0x13e/0x194 [ 1874.040338] should_fail.cold+0x10a/0x14b [ 1874.044523] should_failslab+0xd6/0x130 21:33:35 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1874.048526] kmem_cache_alloc+0x2b5/0x770 [ 1874.052718] ? __fget+0x228/0x360 [ 1874.056271] locks_alloc_lock+0x19/0x170 [ 1874.060357] SyS_flock+0xff/0x5c0 [ 1874.063835] ? fcntl_setlease+0x1d0/0x1d0 [ 1874.068017] do_syscall_64+0x1d5/0x640 [ 1874.071944] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1874.077152] RIP: 0033:0x45c829 [ 1874.080354] RSP: 002b:00007f7a4084ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000049 [ 1874.088086] RAX: ffffffffffffffda RBX: 00000000004dbee0 RCX: 000000000045c829 21:33:35 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', r0}, 0x10) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x60, 0x2, 0x8, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_DATA={0x34, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x3d3b}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x20}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x28000}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x60}, 0x1, 0x0, 0x0, 0x40050}, 0x40086) r3 = msgget$private(0x0, 0x0) msgrcv(r3, 0x0, 0x0, 0x0, 0x0) msgrcv(r3, 0x0, 0x0, 0x0, 0x0) msgsnd(r3, &(0x7f0000000200)={0x1}, 0x8, 0x0) msgctl$MSG_STAT_ANY(r3, 0xd, &(0x7f0000000200)=""/117) msgsnd(r3, &(0x7f00000001c0)={0x2, "aa1ffe617d04a68aee91d02471cdc372f9b8bb88774c11d973f1c7b3afb2e3ad8fd2ad0f2f8f9027243448d1a38deeaaababa0d5"}, 0x3c, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1874.095396] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000004 [ 1874.102692] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1874.109992] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1874.117370] R13: 00000000000000cc R14: 00000000004c3576 R15: 00007f7a4084b6d4 21:33:35 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x4000, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:35 executing program 2 (fault-call:9 fault-nth:1): creat(0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x164142, 0x0) sendfile(r2, r3, 0x0, 0x80001d00c0d0) 21:33:35 executing program 5 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) flock(r0, 0x1) [ 1874.279229] xt_TCPMSS: Only works on TCP SYN packets 21:33:35 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:35 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1874.356161] xt_TCPMSS: Only works on TCP SYN packets [ 1874.365951] FAULT_INJECTION: forcing a failure. [ 1874.365951] name failslab, interval 1, probability 0, space 0, times 0 [ 1874.428648] CPU: 1 PID: 25368 Comm: syz-executor.5 Not tainted 4.14.180-syzkaller #0 [ 1874.436580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1874.446159] Call Trace: [ 1874.448755] dump_stack+0x13e/0x194 [ 1874.452394] should_fail.cold+0x10a/0x14b [ 1874.456551] should_failslab+0xd6/0x130 [ 1874.460529] kmem_cache_alloc+0x2b5/0x770 [ 1874.464684] ? avc_has_perm+0x2bb/0x480 [ 1874.468685] ? avc_has_perm_noaudit+0x400/0x400 [ 1874.473368] locks_get_lock_context+0x20c/0x470 [ 1874.478049] flock_lock_inode+0x9b/0x960 [ 1874.482127] ? find_held_lock+0x2d/0x110 [ 1874.486200] ? trace_event_raw_event_filelock_lease+0x5e0/0x5e0 [ 1874.486203] xt_TCPMSS: Only works on TCP SYN packets [ 1874.492277] locks_lock_inode_wait+0xdd/0x320 [ 1874.492288] ? locks_mandatory_area+0x390/0x390 [ 1874.492299] ? __lockdep_init_map+0x100/0x560 [ 1874.492310] ? __lockdep_init_map+0x100/0x560 [ 1874.492328] SyS_flock+0x4e5/0x5c0 [ 1874.492337] ? fcntl_setlease+0x1d0/0x1d0 [ 1874.492352] do_syscall_64+0x1d5/0x640 21:33:35 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffe}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1874.492370] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1874.492380] RIP: 0033:0x45c829 [ 1874.492386] RSP: 002b:00007f7a4084ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000049 [ 1874.492398] RAX: ffffffffffffffda RBX: 00000000004dbee0 RCX: 000000000045c829 [ 1874.492404] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000004 [ 1874.492409] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1874.492416] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1874.492422] R13: 00000000000000cc R14: 00000000004c3576 R15: 00007f7a4084b6d4 [ 1874.513664] FAULT_INJECTION: forcing a failure. [ 1874.513664] name failslab, interval 1, probability 0, space 0, times 0 [ 1874.669734] xt_TCPMSS: Only works on TCP SYN packets [ 1874.700199] xt_TCPMSS: Only works on TCP SYN packets 21:33:35 executing program 5 (fault-call:2 fault-nth:2): perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) flock(r0, 0x1) [ 1874.760255] xt_TCPMSS: Only works on TCP SYN packets 21:33:35 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1874.860538] CPU: 1 PID: 25376 Comm: syz-executor.2 Not tainted 4.14.180-syzkaller #0 [ 1874.868472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1874.877835] Call Trace: [ 1874.880438] dump_stack+0x13e/0x194 [ 1874.884088] should_fail.cold+0x10a/0x14b [ 1874.888430] should_failslab+0xd6/0x130 [ 1874.892668] __kmalloc+0x2e9/0x7c0 [ 1874.896919] ? kmem_cache_alloc_trace+0x63e/0x7b0 [ 1874.901778] ? alloc_pipe_info+0x156/0x380 [ 1874.906033] ? __lock_is_held+0xad/0x140 [ 1874.910153] alloc_pipe_info+0x156/0x380 [ 1874.914311] splice_direct_to_actor+0x581/0x730 [ 1874.918999] ? avc_policy_seqno+0x5/0x10 [ 1874.923079] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1874.927951] ? do_splice_to+0x150/0x150 [ 1874.932119] ? rw_verify_area+0xe1/0x2a0 [ 1874.936196] do_splice_direct+0x164/0x210 [ 1874.940360] ? splice_direct_to_actor+0x730/0x730 [ 1874.945230] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1874.950299] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 1874.955080] do_sendfile+0x469/0xaf0 21:33:36 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, r2, 0xb, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup(r3) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000001400)=ANY=[], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r5, 0x6, 0x18, &(0x7f0000000080)=0x6, 0x4) [ 1874.958828] ? do_compat_pwritev64+0x140/0x140 [ 1874.963436] SyS_sendfile64+0xff/0x110 [ 1874.967434] ? SyS_sendfile+0x130/0x130 [ 1874.971515] ? do_syscall_64+0x4c/0x640 [ 1874.975522] ? SyS_sendfile+0x130/0x130 [ 1874.979516] do_syscall_64+0x1d5/0x640 [ 1874.983571] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1874.988772] RIP: 0033:0x45c829 [ 1874.991972] RSP: 002b:00007f44839f5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1874.999691] RAX: ffffffffffffffda RBX: 00000000004fc2e0 RCX: 000000000045c829 21:33:36 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000100)='/dev/input/mice\x00', 0x101000) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @empty}, r3}}, 0x38) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x1, "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", 0x40, 0x4, 0x53, 0x0, 0x40, 0x8, 0x6, 0x1}, r3}}, 0x120) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x101000, 0x0) ioctl$EVIOCSREP(r4, 0x40084503, &(0x7f00000000c0)=[0x80000000, 0x1]) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1875.006968] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 1875.014244] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1875.021559] R10: 000080001d00c0d0 R11: 0000000000000246 R12: 0000000000000005 [ 1875.028952] R13: 00000000000008dc R14: 00000000004cb816 R15: 00007f44839f66d4 21:33:36 executing program 2 (fault-call:9 fault-nth:2): creat(0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x164142, 0x0) sendfile(r2, r3, 0x0, 0x80001d00c0d0) [ 1875.055541] FAULT_INJECTION: forcing a failure. [ 1875.055541] name failslab, interval 1, probability 0, space 0, times 0 [ 1875.140647] CPU: 1 PID: 25396 Comm: syz-executor.5 Not tainted 4.14.180-syzkaller #0 [ 1875.148612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1875.157974] Call Trace: [ 1875.160578] dump_stack+0x13e/0x194 [ 1875.164225] should_fail.cold+0x10a/0x14b [ 1875.168403] should_failslab+0xd6/0x130 [ 1875.172391] kmem_cache_alloc+0x2b5/0x770 [ 1875.176901] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1875.182374] locks_alloc_lock+0x19/0x170 [ 1875.186446] flock_lock_inode+0x129/0x960 [ 1875.190608] ? find_held_lock+0x2d/0x110 [ 1875.194701] ? trace_event_raw_event_filelock_lease+0x5e0/0x5e0 [ 1875.200777] locks_lock_inode_wait+0xdd/0x320 [ 1875.205295] ? locks_mandatory_area+0x390/0x390 [ 1875.209987] ? __lockdep_init_map+0x100/0x560 [ 1875.214542] ? __lockdep_init_map+0x100/0x560 [ 1875.219064] SyS_flock+0x4e5/0x5c0 [ 1875.222625] ? fcntl_setlease+0x1d0/0x1d0 [ 1875.226790] do_syscall_64+0x1d5/0x640 [ 1875.230700] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1875.235905] RIP: 0033:0x45c829 [ 1875.239096] RSP: 002b:00007f7a4084ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000049 [ 1875.246827] RAX: ffffffffffffffda RBX: 00000000004dbee0 RCX: 000000000045c829 [ 1875.254115] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000004 [ 1875.261405] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1875.268685] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1875.275963] R13: 00000000000000cc R14: 00000000004c3576 R15: 00007f7a4084b6d4 21:33:36 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername$llc(r0, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VT_GETMODE(r3, 0x5601, &(0x7f0000000100)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1875.360422] Unknown ioctl 1074283779 [ 1875.367438] xt_TCPMSS: Only works on TCP SYN packets 21:33:36 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:36 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$ax25(r2, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@bcast, @default, @bcast, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1875.420135] Unknown ioctl 1074283779 [ 1875.425059] xt_TCPMSS: Only works on TCP SYN packets [ 1875.443196] xt_TCPMSS: Only works on TCP SYN packets 21:33:36 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup(r1) r2 = gettid() fcntl$setownex(r1, 0xf, &(0x7f0000000080)={0x1, r2}) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000008, 0x3ff, 0x4000) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:36 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x218401, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:36 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1875.515211] FAULT_INJECTION: forcing a failure. [ 1875.515211] name failslab, interval 1, probability 0, space 0, times 0 [ 1875.547856] xt_TCPMSS: Only works on TCP SYN packets [ 1875.600063] xt_TCPMSS: Only works on TCP SYN packets 21:33:36 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) prctl$PR_GET_NO_NEW_PRIVS(0x27) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-control\x00', 0x6e6101, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', r2, &(0x7f0000000280)='./file0\x00') r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet(r3, &(0x7f0000000000)="cc000000000000079e9ebbd3fe53a275dbf2172c1a383b414740e761069e032e35f926bf5b89bc233ec873a99fdc473de52f006f0d718100236de5342337d71c2593deefc88fd8eebe1e191f76c28314ef047bb85cfbb17e36f18850d49c9ef69455b5289123416c4208444b9eced25c0e7ba3df71196f6531ec255cc997c32d29792891d0455b4aceac03d5fd4ad942bc9f2c411e9a6a3c69b58212d513ead8bedf1637f9c0d9acc86580a1851f83cf8116b22701", 0xb5, 0x48d1, 0x0, 0x0) flock(r0, 0x1) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r3, 0x12, 0x2, &(0x7f0000000140)=""/134, &(0x7f00000000c0)=0x86) [ 1875.633845] CPU: 0 PID: 25430 Comm: syz-executor.2 Not tainted 4.14.180-syzkaller #0 [ 1875.641769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1875.651221] Call Trace: [ 1875.653834] dump_stack+0x13e/0x194 [ 1875.657484] should_fail.cold+0x10a/0x14b [ 1875.661649] should_failslab+0xd6/0x130 [ 1875.665678] kmem_cache_alloc+0x2b5/0x770 [ 1875.669842] ? SOFTIRQ_verbose+0x10/0x10 [ 1875.673919] ? iov_iter_alignment+0x14b/0x650 [ 1875.678432] do_blockdev_direct_IO+0x32e/0x9120 [ 1875.683120] ? lock_acquire+0x170/0x3f0 [ 1875.683474] xt_TCPMSS: Only works on TCP SYN packets [ 1875.687099] ? lock_downgrade+0x6e0/0x6e0 [ 1875.695408] xt_TCPMSS: Only works on TCP SYN packets [ 1875.696390] ? lock_acquire+0x170/0x3f0 [ 1875.696407] ? ext4_dio_get_block_unwritten_sync+0xd0/0xd0 [ 1875.711097] ? sb_init_dio_done_wq+0x80/0x80 [ 1875.715520] ? find_get_pages_tag+0x461/0x960 [ 1875.720031] ? check_preemption_disabled+0x35/0x240 [ 1875.725081] ? wait_on_page_bit_common+0x370/0x370 [ 1875.730046] ? __blockdev_direct_IO+0x32/0xef 21:33:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socket$phonet_pipe(0x23, 0x5, 0x2) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x541100, 0x0) connect$phonet_pipe(r1, &(0x7f00000000c0)={0x23, 0x6, 0x3, 0x9}, 0x10) flock(r0, 0x1) [ 1875.734554] ? ext4_dio_get_block_unwritten_sync+0xd0/0xd0 [ 1875.740200] ext4_direct_IO+0x53b/0x1980 [ 1875.744286] ? filemap_check_errors+0x8b/0xb0 [ 1875.748809] generic_file_read_iter+0x28c/0x26c0 [ 1875.755577] ? kasan_kmalloc+0xbf/0xe0 [ 1875.759479] ? splice_direct_to_actor+0x581/0x730 [ 1875.764332] ? SyS_sendfile64+0xff/0x110 [ 1875.768406] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1875.773784] ? __lock_acquire+0x5f7/0x4620 [ 1875.778033] ? check_preemption_disabled+0x35/0x240 [ 1875.783062] ? filemap_range_has_page+0x2c0/0x2c0 [ 1875.787925] ? perf_trace_lock+0x109/0x4b0 [ 1875.792185] ? save_trace+0x290/0x290 [ 1875.796039] ? save_trace+0x290/0x290 [ 1875.799847] ? fsnotify+0x897/0x1110 [ 1875.803581] ext4_file_read_iter+0x14b/0x330 [ 1875.808014] generic_file_splice_read+0x374/0x5d0 [ 1875.812877] ? add_to_pipe+0x350/0x350 [ 1875.816779] ? avc_policy_seqno+0x5/0x10 [ 1875.821030] ? selinux_file_permission+0x7a/0x440 [ 1875.825893] ? rw_verify_area+0xe1/0x2a0 [ 1875.829962] ? add_to_pipe+0x350/0x350 [ 1875.833869] do_splice_to+0xfb/0x150 [ 1875.837597] ? alloc_pipe_info+0x2dc/0x380 [ 1875.841851] splice_direct_to_actor+0x20a/0x730 [ 1875.846542] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1875.851402] ? do_splice_to+0x150/0x150 [ 1875.855393] ? rw_verify_area+0xe1/0x2a0 [ 1875.859481] do_splice_direct+0x164/0x210 [ 1875.863651] ? splice_direct_to_actor+0x730/0x730 [ 1875.868523] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1875.873549] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 1875.878319] do_sendfile+0x469/0xaf0 [ 1875.882049] ? do_compat_pwritev64+0x140/0x140 [ 1875.886742] SyS_sendfile64+0xff/0x110 [ 1875.890635] ? SyS_sendfile+0x130/0x130 [ 1875.894616] ? do_syscall_64+0x4c/0x640 [ 1875.898592] ? SyS_sendfile+0x130/0x130 [ 1875.902571] do_syscall_64+0x1d5/0x640 [ 1875.906471] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1875.911669] RIP: 0033:0x45c829 [ 1875.914861] RSP: 002b:00007f44839f5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1875.922586] RAX: ffffffffffffffda RBX: 00000000004fc2e0 RCX: 000000000045c829 21:33:37 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0x1, r2, 0xa) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:37 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1875.929860] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 1875.937133] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1875.944405] R10: 000080001d00c0d0 R11: 0000000000000246 R12: 0000000000000005 [ 1875.954223] R13: 00000000000008dc R14: 00000000004cb816 R15: 00007f44839f66d4 21:33:37 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x7}, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x75, &(0x7f0000000080)=""/229) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1876.078804] xt_TCPMSS: Only works on TCP SYN packets [ 1876.081097] xt_TCPMSS: Only works on TCP SYN packets [ 1876.173863] xt_TCPMSS: Only works on TCP SYN packets 21:33:37 executing program 2: creat(0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x50) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x164142, 0x0) sendfile(r2, r3, 0x0, 0x80001d00c0d0) 21:33:37 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_TSS_ADDR(r2, 0xae47, 0x0) flock(r0, 0x1) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x7}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x81, 0x6, 0x3f, 0x9, 0x0, 0xffffffffffffffff, 0x100, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000140), 0xf}, 0x10000, 0x2, 0x8, 0x8, 0x9, 0x3}, r3, 0xd, 0xffffffffffffffff, 0x1) 21:33:37 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:37 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:37 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1876.253855] xt_TCPMSS: Only works on TCP SYN packets 21:33:37 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0xc0, 0x0) ioctl$KDDISABIO(r1, 0x4b37) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsgid(r3) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x7}, 0x0) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x7}, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, r3, 0x40, 0x6}, 0x0, 0x80, 0x358, 0x1, r4, r5, 0x4}) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d8030000030000000000000000000000000000000000000000000000000000000000000000000000000000f7ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e74000000000000000000000000000000000000000000f7370b0000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f5ffffffffffffff0000000000000000000000000000000000000000000000000000000000000000003019229d120e484a00000000000000000000000000000000000028005443504d5353000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000530000000000000000000000000000000000eb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000ffeb0000000000000000000000000000000000d00018010000010000000000000000000000000000000000000000002800727066696c7465720000000000000000000000000000000000000000000000000000000000004800435400000000000000000000000000000000000000000000000000000000000000000100000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:37 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x7, 0x4, 0x1f, 0x3, 0x0, 0x200, 0x100, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x10000, 0x0, @perf_config_ext={0xfffffffffffffff9, 0x246b}, 0x6a79dffa2b2cc874, 0x100, 0x3, 0x4, 0xffffffffcc3b623c, 0x7f, 0x48b5}, 0x0, 0x2, r1, 0x3) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7b, 0x7b, 0x9, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x10, 0x3}, {0xc, 0x2}, {0x7, 0x2}, {0xb, 0x5}, {0x2, 0x5}]}, @restrict={0x6, 0x0, 0x0, 0xb, 0x5}, @datasec={0x1, 0x1, 0x0, 0xf, 0x3, [{0x2, 0x3, 0x6}], "08dca2"}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x4e, 0x0, 0x7a, 0xa}, @var={0xa, 0x0, 0x0, 0xe, 0x1}]}, {0x0, [0x5f, 0x0, 0x2e, 0x30, 0x2e, 0x0, 0x61]}}, &(0x7f0000000340)=""/73, 0x9d, 0x49, 0x1}, 0x20) fsetxattr$trusted_overlay_nlink(r2, 0xfffffffffffffffd, &(0x7f00000003c0)={'L-', 0xdc}, 0x16, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, &(0x7f0000000000)=0x10000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_buf(r4, 0x29, 0x22, &(0x7f0000000480)="fbf6baf683f69c09d68ec1157c538e19b5e2495c80a574ab503e1a3f49e599df126e1929f648bec1c0c7a2deda176d7428093cdb8d48ab17351c357c97431f5242030f70a342a4071b778d7f8e655e0dd570c3e95df758e793209e1864e08ef944637a831cd713a80201783aa3ac972e8455e1c56f8135e96e34029b29728b13d125a5370f6c1ea4eac2edc9153a11ffa674f86f53df8a42cb18d8c47303be1a39539e60eb9e88fc315e35d2e5a3f86c8f7927dc267aa2861f213ea520a3e8efc5e910f1651251ddfa47617081f146e61c5d4f4616e70320efef958c5a33eeb9c54910314d2f55eef614b42706442f133c9f793c78daef23c5d86777860f66c34682a730d004748bb34c3ba7711857927fc494c2ef417a64d9b6deb09ccea3b5dfa2c7ff9be3d9dfeacddcc73621cce6eacc7ca3bdb02ad354460ed7c4412bca59cc8debfca4b26997b4645380d19e79066a08bf1e21199db293b4ae073e764cc2b8978d4fcb47b9eb2eacd8b652e94c4e373302f72bd81422d6d14d2ebe7bef9d7221594a6cf088a6e2d340d3231eda1bbe359e7795bed0c766b2c36455f9bb6ceda362efd5c46251b28a218781434c6be55a90a9a1f2a4eec5ee4d587cf11a0e802acd2d2f8fb618d75017071c4c97f3395f12e10df4e6c62220204fe0da23f3742ca5cc6933f32b70d24d43744070bbb75ce7cde8852d70eefdbcc320776140160cf20da4bf36c97ee2daed43f6f737d9ce85a115bf4dd336c9dfff71014362934a46563344d9fd9d26cbce48ae46b7566d06e393355d9daa11299baa19c38c3c5138b0e2d584d71ffcafa12867ecfda8aa1e78f9684ee0ae3262ae7ca6996fc1608cb6bb2bef2c73a9300295572c2e0c141733c47798f8066df5bd5032fcbb6860294bb6ed98dbc4b5ab649c32a4f9d94dafa1f68426a4db5f6a83f37560de2b2ed8e01b9cd94755e54028c362cf2b30d7005a47bc5783f0cbee01157b87afe6697667bc49f4a667ff91faefaa756fef45994f6319feeb1b737a89932f1dbd99716f7effb2dea8b4ec355b60df8097ece3808457acff0c03354550018e7ac45918488555e5b68ca6c0e260bc8c06db67f2336cb02bdf570724027dd633bce047cb3497f3f3b99435a64ad045581ea1b2da612d5a5434c9922a81ffbd02738fc788ba3639822c7151d1186dcabe56630578c913a0059a5d3e9682be08ecad6ea5d97a23ed841c9a1b55a37a060f265d04834fcd301f04a50a2445ffa64b37cff60bb0fb0da36265d4cea4168a371cc8380b1eda768942dfea9b79ed90668c7187c4495354601cda092fdf3c216c7ccae6eb4dfaf9b94e6dfc04ec7e9f0f2487c3be26cca100a8852fc88240eb62cabee3e860a23fd06ccb77b42e5075df47e8914990063fecc0e1be5b469ea86d4bdcf237e8053dcf7a445a77508b551b4c6e3a4fd35548b9feb29624bcc7934efa5f1eeac1e977fad47c7bf4195e51d69a8606352063fc6744b7a81f2b1fca6d26f5405aac418bd9b9dbb555f52baa684b92cd57a7cb614d7fa49bdf6df53f2dbe2aecae55a3bb67f21a6e0e9538e42cff6c6ff8866ed3d7cf19401884c6b4ff24863d2a7a8fe23b585263fb55157b4972b9a74bda82120a1ca2ccd6f38eadec028d3cfcee43316a400c77fe694f2f4dc4581970bc00affb6061db993da2547c63341ba53d43bca240ca0d6bde5ce3bbdc3d2b73a10825e9e5c2162d0682d6cb3e319cdbf2ea4439f9aff32485d372e71e321f0d331690d8ac30802319ca8219d9213541ea878b65909b4029df3a14094c760bcb1804a11617cf2a9b9f13ed24477c453ba91a11a03dee7e8526d2421bfee0c995517e336ca03b7b0cee0908c6468acc9f85847dfa525f2a23a8be4fe82bbf66b0d9acf46a816ec8ebb0550b2b0038764ddcfe77605983dae02f6f84b9f118433534aa8871f399db516e51c5eb07675fa3653699b22ed73d42965af970df6c5171c26e839bcf8df9aecb9b6e9aea2594097834d646d3aecc4dd5b090217cca16f63328c65ddc92de8f6b340e85b0cad1e3835c064a589ff85e57458e02eb080d95c82bc7d93c5c20b0e5e46c0918e1c17b41d2282a8ff0e75c2daccd0e9a343c4cd6ff8ea69fcd7d983b0f0a8fb0563e3de7aaa0d2b796ccfa10a9300e8a60e57f943fe7a74099cb1f6501a790d4336159c511bdf08414d3161a3e2312ac0a3a6c084b1bba256db600c612340dd9e1c92938914e9f3717f0aa5d64e950aed8d35da6c4703ddb10bb71c2512c9ac41df74fb5167b6eaedce518760571579a3b8749a224b87513f0a796a7c3bd7f191002041faba45cee6e8df4afc02860720d9c8006619edd6ad7f6696260c8206620c6feb34e483d7785e2eed97603ba2cb87c3bd4da8256eb6e8e3a4315dd4e4b69796b9aee8fb9784aa173c850610df220c257525633d56398b87d240c44b28928338825ab661f2ca05775c6612edfc3c02c9bfe53dc44cc5bc6daeadb99cf9cd6312b90086acfb316cce7e76b5dcee8c9c6fa3d96a500349230099c65269443a60623c251e127714d05a97b49bc83ceffa60361eafba3b39a41da98f10a614349e62c564c84146919923cd338fa533ff8eefd40c86afbd0b83b0974e07ec271e419bee4322a00d91b399aacd65a7811d0e90f53562c933ed877852c632ab8d4e0763063b4c5f5649175ce68eadebb60e2a55482521844986a7b7bfdb8876fea3fad2104845cf03d95fb9f27b149f4e0ccd09faaa7b8c9ab3f709344e4a204f2a30559394c3adcd9c54fbea9c8cecf668f9ead1622608352539c10c58e3c697452c4278eec0962aca1db4ed81e7c241edb9af5f6a84636ad254e231034fb180457c9a5d0d599aff399a89b8a7afc159ab2cd64535666466291a6381cf5f10e98b9ad4a5744e1fd9f2df1874f2b67119c513bcf4e8a2a1e8392feea8de852d565907be7d58a148a939af76f8766ffa4958096bd2ce5f224e2e6b2ce4cdec8aaa97e35d5a7e09b21919cb34cb3a4ef09235764aefdcbd96b9aa43b9f9b53672eab7229ae211147b1a711ef91c34f76d6c20e4c7e7b7e6eeb631b923be09df8b89c290cdee5d1f24f5c8814d8e0e6083547be9c54e674c13801f807bdf0544c0d12d71c85b5261667a69058e698b53c3c3f79eda87ef1c14dcc815bf7816647e8df6894bd59ba7f4ef1df474bd0eeeeae7610d2cb892dc9733aa20b3eafa03ee344e4d94d443ee6bebb9014289a14ef28d081929e7f522b851e82d4ecb068c9487e131d6852e20fde9103056f887d03e42f5b11ffa08b19459657aa159394ddf03ad0d9617ab4aa56bedb07c54cbbc71595922c793ab2cfe1e55a75e14a20359b7bc6ab26c596b4a63aaece9939a9adb0747079736c4ce1d0b4c1a650b1d93832af2a7a27ffdff34bb8a04eb7e858d7362e51768a991cb5fa4ce8ec8882ceb1ba1fa93ba2ca0093d704f5586574dbf038b08b264da74fccc308979288b95ea97a1a607d818610759b543b92b3934acd5dddfbe76fdce2b954401d15854ac36d101cb5aa515c43e726df424fc4e26022a7cb85bc171071ff17b86d5b4504575dd8ed2432d74fe51d0708364133eff8951fb0148483f5fc0891fd2b23580d3c18e1ccd6dacceaba2f054a6d407db47f372fd71cc1338ab36562322d13cafdc5e67737f383a0eca9eec6e672a6823410b8fccbd4c5d00ac1ea577c0dfe17fa48d4cb6c5f38fc4ed461c27b8ef5ff5c4635d04d492bfe7d2cdd1637e1e6ea8f2bb8466a21bad1b74d4a80fda549f67b19ebd583ebf9c8b129fd77ddb78bdc9f3b2d3dc6a9394c15aea74895435874ee8272463ab5666787bd2575beb6c4a4443c859ab6e660cd2d42715e60bce4452da867cdd17f0e7b4d607c103f8fda2e06fa7878d006aa08812393606630afd9d4c099301f693426d0cb2e4b41717e3061da18bfd0d763a2e803c15ca0cd463b2b0d8da5978a78184b111e1eff0ff332873c06a7f7cc9a39aa0b64af225612bc0d4979585ab97e58bdac08fb86a664c1e4fc6717986bda1aee0a0257417a79e3b8eb735d880abe0ccdb51c2969f2b0552372f4fce1a522090ff07fa5e79035992ce970a54cfffeb84f7a5980454f7ba668258fb4e46bb17ee18d0a6f193c506f679310e7a17b215b5cd192e1d8a7bbdd8a590a25a55d4c747c5b80bc52e57dd7976651c3cff22273fee4908da30b24a294241dee0de5dc2bfe3c6360238c50fe4ef1edf90a2f5acc190f132620060c951f66da16f74ba60e5a41ab35b08e46c387de31a6ca47914425361edf4952b832a7867bb9d95b0cff2763a2324199d7f20b5212c94af7250af2b5c6c9f43255ff99d587a805140cff29c1ac725992c2877c549ae4a2de3b761b635fa4cd38db5c7f7b5a960e050adb9ba5d2e73ed66a462207a3339d5583eb8bee22bbc49dbf7d3b16c46181bae10df2eabc255faa25a04eb892a4116529170617817dd10be842d544ca3c7c27cbe8727e7fa3ed85cd2f259f5566d0a59f3c3146ef3d9d2d074e344e0a47da251c0d054b9779537e29efee4355d5fa6b2d563567b2fdc951fc771f6c32be2307ef714860a70c1b980b81e9caf46b3838e35a57dc529b410a76e0290638571bc5001119649010cc69fd88af0a3b5e02f113573858b888ec3b6ae6ffb41bf74f0393a7f2cc7fb422a1c6a6b41accb56f3fc394bc4cd861e9053e1b2f91ecc9b0abc4534d63132686d87783a701a25827148f595fa5d1ec0234c1c982f5cd6aeb4de7bc9aafc4c5d47c12b01d19ac7aff422bdaa6c9f01459bc07cc213ac6740b01f76bef4c4ac2880ad8eb8ac8bb5becfad32d1f1009bc3453ddacdc545f8970ab9fd3226ac7a3d3e4c7f68c4f9d25f5fb7f89957b7a06495247b22b8db7edd2abc08e47339e31b71611c039a8ab92519931e9c32274006b04d44c62e240377b1c753c46b40d9a8dfeea296090127fbd21bf3feca1e0ec5c963e73a6787ed8d7e9b6c5e8624b6cd89279de7339eedad33c215de3ac4568b8884787e1b92fe1bb4e6590b2b9140b6d6913024c5078eaea7277918b835922bf47445bcad209da9a4c6bc1d020acfcee3a038c0d1d8af7f80a77de62618a332d926e96e9811899a4cd23ea9b0ada827a48f848a7b39c98b27d910df3b98f0e188cafba3698d385d50b41523d49fc32ae30af121e3303116b300ce920b5163ef4de0972c01171c170f8f9fceecb83634ef6da590176390167ab22bb37820f94dbaf414772e6e5ab2a00d61b2e6763b8dcb49969b9cfc0544355974b7c69ee62ce77944cd6fd092d4d32a624d48047d4ab90a42204f486519ca4347b54c831dea57641c06d2bcd8ea6890a32bd6c45ce7129c66413fcdf4f7e7726e80bd7a0e89adfe0ae2c7e80c8ffef4a26a97a2598e7e27835ca378f2a4ce8a59af765b6dd5c6ae1326e7e0f9bf2dae4bff1328f75bbcac82d26be3e41137ea7c39e23bbee06641a2d934574a5bdf91c9142f271579d2a1b1da124df1a8bb8245b425393c7bde42ef7fdc2abec9c452484d9726db1b0df3364d4034d43c5999ffe9e16abe637ec4cdea40bfcb4bc3083594d34dc9c166c61b073626a98d6005259a2c0b885970fbf5c4ecee1244f4f68bd6afb47e410ee5f5e601e61e5ed56da7de51f7bbc75e380baa37f44cb553ac18698c72b766da7621e159159f527205fc635de3d7b27883d8077647df6fd3c7757e61b6c05c36d6ccd0f0a51c38926129fad38728e20b8dbf2f2caeab2fb3e056d1baa0957ffab9f1956d810d161", 0x1000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup(r5) ioctl$sock_ifreq(r5, 0x8927, &(0x7f00000014c0)={'veth0_to_team\x00', @ifru_settings={0x877, 0xcb6, @fr=&(0x7f0000001480)={0x101, 0x5, 0x1f, 0x80, 0x0, 0xfffd}}}) ioctl$SNDRV_PCM_IOCTL_INFO(0xffffffffffffffff, 0x81204101, &(0x7f0000000140)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) flock(r6, 0x1) eventfd2(0x3a71, 0x800) 21:33:37 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(0x0, 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:37 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) flock(r0, 0x1) [ 1876.795222] audit: type=1800 audit(1589578417.902:225): pid=25494 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed" comm="syz-executor.2" name="bus" dev="sda1" ino=16370 res=0 21:33:38 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(0x0, 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:38 executing program 2: creat(0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r4) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r4, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @empty}, r6}}, 0x38) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r6, 0x0, 0x2, 0x4}}, 0x20) r7 = socket$inet6(0xa, 0x400000000001, 0x0) close(r7) ioctl$USBDEVFS_CLAIM_PORT(r3, 0x80045518, &(0x7f00000000c0)=0xfff) r8 = open(&(0x7f0000000080)='./bus\x00', 0x164142, 0x0) sendfile(r7, r8, 0x0, 0x80001d00c0d0) 21:33:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_INFO(r2, 0x80386433, &(0x7f0000000140)=""/230) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) flock(r0, 0x1) [ 1876.916098] audit: type=1800 audit(1589578417.922:226): pid=25496 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="bus" dev="sda1" ino=16370 res=0 21:33:38 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) tee(r2, r4, 0x400, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f0000000140)={0x3, 0x7, 0x20, 0xff, 0x9}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a5b92a746ffb98f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f8007200000000000000000000000000000000000000000000000000000000010073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c7465720000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flock(0xffffffffffffffff, 0x1) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f00000000c0)={0x4, 0xffffffffffffffff, 0x1}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x200300, 0x0) 21:33:38 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(0x0, 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="e14e4129cbc07f77a1ae4ef335ccc205050122e409c50e8bc393000414c3cfd56f922858e597e7aed6d83605ccbad0afa16ff30600f7ffffff0625f0f45e37900e5c1c998de8f79949f45fbcaeeeffff00000000000000000000000000000024654c2a334116210128065cb43ad59a05c112b01f2a52299f1de750e651d033a3ce950fcee7d079ddf9bf3cb41e9d089ef0c76e66a3abcdbf36f5b53e752ee4347641635bb245287595b3e818238236d7ab593998e585f79544217d5ec5f305651c675939c3a68a683294647fb7c90e81f6334d7ebd983e218a0b8d8d93557c3b27d37f32c427780c3832122cbf92b69bd3a2fd23c2d913e6f71e545739", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:38 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:38 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$6lowpan_control(r0, &(0x7f00000001c0)='disconnect aa:aa:aa:aa:aa:11 0', 0x1e) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f00000000c0)={0x9a0000, 0xfffffffc, 0x7, r1, 0x0, &(0x7f0000000080)={0x980915, 0x5, [], @value64=0xffffffffffffffff}}) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8930, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffef, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000ac0)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d80300000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a873f01c0000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000c20000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000c1cfa3eed412ec2b0d8f18c7484b898bfaee661337ccd7a8b53498928a8ee83cc03fe2709628d1f9a4dde52486b51c3ec90eef59420eedd2bcbe52d358"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x20c9b9ead485b158, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f0000001a40)=ANY=[@ANYRES16=r6, @ANYRESHEX=0x0, @ANYRES32=r6, @ANYRES32, @ANYBLOB="9eb94ca3001246f47bf0b220ffa696bd426f7c1bc69f7ddd40c330d4ffef7ae5fe5c6b2b47222774a42fd2f57389a02d136e36332729c5fdcda0af16f88ad5026cac3279a88822abe8d3cb4c905def8103ad74a3066dec3d8af31b04af90403a44a501ce7a8edb76869d88576b6c776eaa349ce08a905ee5bf80436d20750693e1eca00f9e749dea595c0799f5596428bede59e2127bf1a5c48c8881", @ANYRES32], 0x1e0}}, 0x20000815) sendmsg$TIPC_NL_MON_PEER_GET(r5, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x7d99e8f2b085d078}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="00010000", @ANYRES16=r6, @ANYBLOB="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"], 0x118}}, 0x4000080) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:38 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:38 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_VL_CLR(r2, 0x7014) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1877.576782] audit: type=1800 audit(1589578418.682:227): pid=25531 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed" comm="syz-executor.2" name="bus" dev="sda1" ino=16501 res=0 [ 1877.698750] audit: type=1800 audit(1589578418.702:228): pid=25563 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="bus" dev="sda1" ino=16501 res=0 21:33:38 executing program 2: creat(0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ftruncate(r3, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) socket$inet6(0xa, 0x400000000001, 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x164142, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) times(&(0x7f0000000000)) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400240) clock_gettime(0x4, &(0x7f0000000180)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r6, 0xc058560f, &(0x7f00000000c0)={0x800, 0x3, 0x4, 0x8, 0x800, {r7, r8/1000+60000}, {0x3, 0x1, 0x3f, 0x80, 0x5, 0x81, "08f9f00c"}, 0x80, 0x3, @offset=0x3, 0x6, 0x0, 0xffffffffffffffff}) ioctl$EVIOCRMFF(r9, 0x40044581, &(0x7f0000000040)=0x3) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x2, 0x0) 21:33:38 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) flock(r0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000140)=0x3, 0x4) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3, 0x200) ioctl$RTC_IRQP_READ(r3, 0x8008700b, &(0x7f00000000c0)) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x1, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @empty}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x6c, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000180)={r7, 0x20}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000200)={r8, @in6={{0xa, 0x4e23, 0x5, @private2}}, 0x2, 0x6, 0x4, 0x4}, &(0x7f00000002c0)=0x98) [ 1877.747769] xt_TCPMSS: Only works on TCP SYN packets 21:33:39 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000300)={'filter\x00'}, &(0x7f00000001c0)=0x54) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="2000000011000d040000000000000000120010f2a6c70000", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}, 0x1, 0x800000000000000}, 0x0) recvfrom$packet(r2, &(0x7f0000000080)=""/137, 0x89, 0x20, &(0x7f0000000140)={0x11, 0x47dd2286b39eaa0c, r5, 0x1, 0x1, 0x6, @random="0f2443ebf5c7"}, 0x14) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}, 0x84, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000011c20706000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) clock_gettime(0x1, &(0x7f0000000180)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:39 executing program 2: creat(0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x160) sendfile(r2, r3, 0x0, 0x80001d00c0d0) 21:33:39 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="e14e4129cbc07f77a1ae4ef335ccc205050122e409c50e8bc393000414c3cfd56f922858e597e7aed6d83605ccbad0afa16ff30600f7ffffff0625f0f45e37900e5c1c998de8f79949f45fbcaeeeffff00000000000000000000000000000024654c2a334116210128065cb43ad59a05c112b01f2a52299f1de750e651d033a3ce950fcee7d079ddf9bf3cb41e9d089ef0c76e66a3abcdbf36f5b53e752ee4347641635bb245287595b3e818238236d7ab593998e585f79544217d5ec5f305651c675939c3a68a683294647fb7c90e81f6334d7ebd983e218a0b8d8d93557c3b27d37f32c427780c3832122cbf92b69bd3a2fd23c2d913e6f71e545739", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:39 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) flock(r0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000002c0)={0x14, r4, 0x301, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x64, r4, 0x20, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x7c}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x4}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x2}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}]}, 0x64}}, 0x20000000) [ 1878.030051] xt_TCPMSS: Only works on TCP SYN packets 21:33:39 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup2(r3, r0) ioctl$SG_GET_SG_TABLESIZE(r4, 0x227f, &(0x7f0000000080)) 21:33:39 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:39 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffb}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000001c0)=ANY=[], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x6) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x4) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x3000) ioctl$USBDEVFS_DISCSIGNAL(0xffffffffffffffff, 0x8010550e, &(0x7f0000000180)={0xb4, &(0x7f0000000140)="1859a740162800cf24b47a53763c51925743c7818095528fd9580c0a0f1de2c967fbdfddd01d248ea0b0"}) [ 1878.154083] audit: type=1804 audit(1589578419.262:229): pid=25590 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir067699137/syzkaller.nI24Jn/46/bus" dev="sda1" ino=16389 res=1 21:33:39 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000140)="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", &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000001140)="eb616c932acd106b9f183ae02420969ee644801af782e4cd4156a217cc321dc2043ae0765c24bc7fff7ffe10ae645d77d8e90cc14bf13d276d1efa52f5ffc15565dcef5a8bdd1b05bfa715f3e8cb6e9bd9140bdd393ef987c2cff68a8d555a4f48c1013eb89ba7f02fe9c66f60b4a7198aa3686111cf5fd804616e5695ed297e39a3d84ede521a1b32bd118af2") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) flock(r0, 0x1) 21:33:39 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000080)={0x7, 0xffff, 0x2, @multicast, 'veth0_to_hsr\x00'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup(r1) getsockname(r1, &(0x7f00000000c0)=@x25={0x9, @remote}, &(0x7f0000000140)=0x80) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000b80)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000679e2c9f5a42f49f59665fdb900f9fa538da9c5b17f5e6c21ce212e529de9a0196c4e08ebd8f4f05f6a4826f6bcfc7b2646b2fa8bd408a19b60858243fb6c70b3da10d902def0c16b8ba861cb1367326c316826f505c453891ea350fb1f6738329f213ecbdcc5f6acb6d9a6b4f09d3d96b61dec2dad9d287483fb6a0a0ba2138e1bd1b409a327fa0f0361ea3e7cdc7bf073e54c488d3eafc14ccd1ba6ecd89dc04c596888818d339c3e55f66138d050b3e20a44d1e2648636698bc978ea2b421f5af684b9a6063fa5fe5aa0abca7195b1ba33cd96e49b103b42ab83d845e4aa26b555df4907c219627a026d4aa396801a97cf0a42ad7eb7c0795542b3fbd5232c1a964f8"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1878.262458] xt_TCPMSS: Only works on TCP SYN packets 21:33:39 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1878.430717] xt_TCPMSS: Only works on TCP SYN packets 21:33:39 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$DRM_IOCTL_MAP_BUFS(r1, 0xc0186419, &(0x7f00000002c0)={0x2, &(0x7f0000000080)=""/150, &(0x7f0000000280)=[{0x7, 0x5a, 0x7fff, &(0x7f0000000140)=""/90}, {0x1, 0x3d, 0x800, &(0x7f00000001c0)=""/61}]}) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1878.460656] xt_TCPMSS: Only works on TCP SYN packets 21:33:39 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0xa8d}, 0x0, 0x2, 0xffffffffffffffff, 0x0) flock(0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_PAUSE(r1, 0x40044145, &(0x7f0000000140)=0x6) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000000)={'HL\x00'}, &(0x7f00000000c0)=0x1e) [ 1878.536769] audit: type=1804 audit(1589578419.642:230): pid=25627 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir067699137/syzkaller.nI24Jn/46/bus" dev="sda1" ino=16389 res=1 21:33:39 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) io_submit(0x0, 0x1e0933b8, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x12f}]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$cgroup_int(r2, &(0x7f0000000080)='cpuset.memory_spread_page\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x6, 0x1101, 0xffffffffffffffff, &(0x7f00000000c0)="ba4a9e00a70d6b32f93b6199ac814ceb3e3637d904ff02ab49271c84", 0x1c, 0x8, 0x0, 0x1, r4}, &(0x7f0000000140)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:39 executing program 2: creat(0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)='udf\x00', 0x40040, &(0x7f0000000100)='md5sumvmnet1\x00') ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d1) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x164142, 0x0) sendfile(r2, r3, 0x0, 0x80001d00c0d0) 21:33:39 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1878.673032] xt_TCPMSS: Only works on TCP SYN packets 21:33:39 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = gettid() perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) accept4$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @private2}, &(0x7f00000000c0)=0x1c, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x8000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1878.727928] xt_TCPMSS: Only works on TCP SYN packets [ 1878.731029] audit: type=1800 audit(1589578419.702:231): pid=25590 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed" comm="syz-executor.2" name="bus" dev="sda1" ino=16389 res=0 21:33:39 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getcwd(&(0x7f0000000000)=""/17, 0x11) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0xfffffd38}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r4, @ANYBLOB="ff00000c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="5000000010001fff000000000008000000000000", @ANYRES32=0x0, @ANYBLOB="000000001900000028001200090001007665746800000000380002001400010000000000", @ANYRES32, @ANYBLOB="200002000010000008000a00", @ANYRES32=r4], 0x50}}, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f00000000c0)={0x1d, r4}, 0x10) flock(r0, 0x1) [ 1878.922479] audit: type=1800 audit(1589578419.702:232): pid=25627 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed" comm="syz-executor.2" name="bus" dev="sda1" ino=16389 res=0 [ 1879.005194] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1879.057818] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 21:33:40 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:40 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_tcp_buf(r2, 0x6, 0xe, &(0x7f0000000280)=""/88, &(0x7f00000001c0)=0x58) sendmsg$IPCTNL_MSG_CT_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="78000000010105000000007e4f50aba500000000000c0000000c00170000003c85ffffff1c2c000f8008000240000009f108000100000007ff0800024000010001080001400001000108000240000009712c001700000001ff000000810000080000000006000000090000000200000002fffffff9000000"], 0x78}, 0x1, 0x0, 0x0, 0x44900}, 0x20000400) 21:33:40 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x82200, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x4b, 0x200000) write$binfmt_elf64(r1, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x3, 0xff, 0xd9, 0x7, 0x2, 0x1, 0x3fb, 0xe4, 0x40, 0x247, 0x8, 0x4, 0x38, 0x2, 0x6, 0x1, 0x3ff}, [{0x1, 0x2, 0xff, 0x9, 0x0, 0x1f, 0x4, 0x8}, {0x6474e551, 0x9d3, 0x1ff, 0x100000005, 0x1, 0x81, 0xc67, 0x111}], "dc5c90580ad547c8212ab951be1da41896151456d3ceb5dbbdbe03d9e7e172bddee1b0a1fffa9c2b20fe6c9ba946dcee", [[], [], [], [], [], [], []]}, 0x7e0) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:40 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1879.268695] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1879.288079] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 21:33:40 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x7}, 0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000009f130221d070eff5f8e9661e45d35cfcdfa082a877feea2b5d2c6d86005ba7f3251253bb6695fa"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1879.337421] audit: type=1800 audit(1589578420.442:233): pid=25652 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed" comm="syz-executor.2" name="bus" dev="sda1" ino=16717 res=0 [ 1879.375247] xt_TCPMSS: Only works on TCP SYN packets 21:33:40 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x400006) flock(r0, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) [ 1879.384296] audit: type=1800 audit(1589578420.442:234): pid=25650 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="bus" dev="sda1" ino=16717 res=0 21:33:40 executing program 2: creat(0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x1, 0x1be, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, &(0x7f0000000040), &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{0x9, 0x31, 0x884c, '\x00', 'tunl0\x00', 'rose0\x00', 'bridge_slave_0\x00', @empty, [0xff, 0xff, 0x0, 0xff], @empty, [0x0, 0xff, 0xff, 0xff], 0x6e, 0xe6, 0x12e, [], [@common=@nflog={'nflog\x00', 0x50, {{0x3, 0x8, 0x5, 0x0, 0x0, "2b9568410e027de6fa7712f6fd9a0563e0b61aecdf21fed06e0588b20a69378413e1d272fe85b3bf1321b1188b4fb72bf666d936c35d3640a869446d96d4697f"}}}], @common=@ERROR={'ERROR\x00', 0x20, {"190bf5f94280ff6014c323a70fddd1bc26c6b582d3b976bfd9be3ce4a1b6"}}}]}]}, 0x236) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x164142, 0x0) sendfile(r3, r4, 0x0, 0x80001d00c0d0) [ 1879.438042] xt_TCPMSS: Only works on TCP SYN packets [ 1879.465378] xt_TCPMSS: Only works on TCP SYN packets 21:33:40 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000001c0)=[@in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x3ff, @private0, 0x8}, @in6={0xa, 0x4e22, 0x6, @loopback, 0x7}, @in6={0xa, 0x4e20, 0x881, @dev={0xfe, 0x80, [], 0x1d}, 0x1}, @in={0x2, 0x4e20, @multicast1}, @in6={0xa, 0x4e24, 0x7fffffff, @remote, 0x20}, @in={0x2, 0x4e22, @broadcast}], 0xa0) ioctl$IMCTRLREQ(r1, 0x80044945, &(0x7f0000000080)={0x8, 0x8, 0x1, 0x10000}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000b00)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000000005f3b1a5f67268a02e77ce098a7e5cf86c2ff361772b61f5cd06abfe2ba71b58dd3c8a3609f67288acbd2175a24bfa55babe068e96cee8670df43bfb319b40072d386e61b56d413b0ad2251289681e275d1f1b2dbbdab00789eb43777fbce19f01783824081731651078d62088e47fd6355ce9a8ec506c6b2af43f2b0cb98fccc24cbef1db049e7dbe765317337abb0ecf5dfdba40cad0217a019394cf000000000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f00000000c0), &(0x7f0000000140)=0x4) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1879.543549] xt_TCPMSS: Only works on TCP SYN packets 21:33:40 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000036f51200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b490845f31b9bde1b6dfb51cb38cf6000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d0001801000000000000000000000000000000000000000000000020df206a919557b6d9ad3df27d7220e9002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000700000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) syz_genetlink_get_family_id$gtp(&(0x7f0000000080)='gtp\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000000c0), 0x10) 21:33:40 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:40 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000540)={0x0, 0x3, 0x4, 0x8, 0x8, {0x0, 0x2710}, {0x3, 0x6eebce00883a3125, 0x6, 0x7, 0x1, 0xe0, "f5faff80"}, 0x4, 0x2, @planes=&(0x7f0000000500)={0x7, 0x9c, @mem_offset=0x5, 0x7}, 0x400, 0x0, r1}) getsockopt$TIPC_IMPORTANCE(r6, 0x10f, 0x7f, &(0x7f00000005c0), &(0x7f0000000600)=0x4) writev(r5, &(0x7f0000000480)=[{&(0x7f00000000c0)="04f982ca5c119cf8cbea", 0xa}, {&(0x7f0000000a80)="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", 0x1000}, {&(0x7f0000000140)="f1bbc0d6e00ce4c418edb5242ec26f7e51805948946729683d13e4d0da878bd8e6eb8e7a4bea83d05668146124e3e4502824b196bc48962f16627d7186aadc3282aa8f102669e53628ed3b691d25b01aab1e3be4c74b03490449513fb47fe53b877bb156c1efea57ec42e47a586f28354086585a088cbf73659ae1aba59faf5f19b7027c5f254b13362f5e7b112bfec10a5827b87761dd741e8299a42ca38d7858f7351ca18adc053ad649f406413d6a435309fd21a173c36ccc921e", 0xbc}, {&(0x7f0000000280)="db605dc52ef1c992649fd62d21243f40323342bbc0eb16c64a1ca135e6f5cedd0c2ae8096695130c8007de9b779d0044b23df738922008a841bf30fbf645ef920abc934bd030a26240a36cbe59f496bd41df2feee93bb871d276aa5e10312ae53fb074190bc629ea77a5f2aa204e8a663c35fbefd70092e3fc35b20081da5995c325b7d9945bd0caccf764a5805481ffa966569d6f38ef40c6589a31216a4eeefa1c7133ec043cc215392ebef092b9633386e811397ae07b41c1e5bc537aad7c6024f135f9c27447e90b", 0xca}, {&(0x7f0000001a80)="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", 0x1000}, {&(0x7f0000000380)="e40d8130b0afcb34fd24bd5d8e842fbd8a4b8fba066cc1737a431845b7ba12918e7f45e1af0e31587fd5076194c8db7039c4a44a6f594b0d36c6c880195e5daa28559ec7e6af32de1e26ff9ac3bf39e39f8437667df1ba1358161f76d34100f0f18a86d127bccd5b6cb0fdb349be811da32b6feebba8f54e0a95cec58dc2f303bfb0", 0x82}, {&(0x7f0000002a80)="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", 0x1000}, {&(0x7f0000000440)="83c3fa1a7784f92dc0a112c0b7dbf21bcd77e56e26d138bebeec4d9c099d2d1bb7cbab21985259830a0fa05df3d4d870", 0x30}], 0x8) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000003a80)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000074996dba2c15000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d00000000000000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000000000000000009ff14d439897da2698f1429b4736c21d06b407ab2741fed39565ea"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:41 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200a02, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1880.195237] xt_TCPMSS: Only works on TCP SYN packets [ 1880.237157] xt_TCPMSS: Only works on TCP SYN packets 21:33:42 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:42 executing program 2: creat(0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000000000)={'veth0_vlan\x00', 0x5}) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x164142, 0x0) sendfile(r4, r5, 0x0, 0x80001d00c0d0) 21:33:42 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup(r1) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000080)) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_sctp(0xa, 0x1, 0x84) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:42 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:42 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000caebe044e533ebb4e8edb2557f9139870000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000893bf8e1276dce5d10a1c56a422a9c07e706f08424d719d961455e28c7058dfb1c86548c674ee6edf5e4cd3680420de9aa98294aebd508bac23f8e2be79b38ecda4443f277643ab2ff1ef69bb842"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x40c) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f00000000c0), 0x4) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1881.170911] xt_TCPMSS: Only works on TCP SYN packets [ 1881.304792] xt_TCPMSS: Only works on TCP SYN packets 21:33:43 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:44 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:44 executing program 2: r0 = creat(0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) ftruncate(0xffffffffffffffff, 0x200004) sendfile(r1, 0xffffffffffffffff, 0x0, 0x80001d00c0d0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x164142, 0x0) sendfile(r2, r3, 0x0, 0x80001d00c0d0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000000)={0x5, 0x0, 0x1f, 0xffffffff, "3613150b00c15dd3af49ff8c85d5a66a0812fa2d413947d089c3ee893b47bf0f"}) r4 = fcntl$dupfd(r3, 0x406, r3) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r5, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0100000000000000a226b6f9282f553ef2afc7820000010700000000017ffa0001000a0000000a0006006c626c63"], 0x34}}, 0x0) sendmsg$IPVS_CMD_ZERO(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x60, r6, 0x8, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x34, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e23}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x2af}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x96}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7fff}]}, 0x60}, 0x1, 0x0, 0x0, 0x400c891}, 0xc040) 21:33:44 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x80000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$NFT_MSG_GETFLOWTABLE(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200001}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x17, 0xa, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, [@NFTA_FLOWTABLE_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x4000080) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x1000) setxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x3) [ 1883.301136] kauditd_printk_skb: 2 callbacks suppressed [ 1883.301144] audit: type=1800 audit(1589578424.402:237): pid=25786 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="bus" dev="sda1" ino=15791 res=0 [ 1883.360568] xt_TCPMSS: Only works on TCP SYN packets [ 1883.407134] audit: type=1800 audit(1589578424.502:238): pid=25786 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="bus" dev="sda1" ino=15791 res=0 [ 1883.445101] xt_TCPMSS: Only works on TCP SYN packets 21:33:44 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:44 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:44 executing program 2: r0 = creat(0x0, 0x0) close(0xffffffffffffffff) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x1a) ftruncate(r1, 0x200004) sendfile(r0, r0, 0x0, 0x800) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x164942, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000000)) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000180)={0x1, @sdr={0x32314d48, 0x400}}) sendfile(r2, r3, 0x0, 0x80001d00c0d0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x2c, 0x4, 0x101, &(0x7f0000002b00)) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80800) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r7, 0x40bc5311, &(0x7f00000000c0)={0x4, 0x1, 'client1\x00', 0x6, "1e6be00f6355384d", "ea7c4d69198885dae18c5d06dd1f89ac4048667836460e63a632a3edfd7cab8e", 0x1, 0x4}) 21:33:45 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:45 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000100)=@gcm_256={{0x304}, "bd2aed0b4c14a4b9", "f721ea5128ee2b0f492f8d0e6490b968978a2346af82ee5632fd3f74973c10b1", "1755974a", "550cac0b66de4ca1"}, 0x38) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000280)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c02ca200d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a300000000000000000000000000000000000000000000000000000000000b20f73e4e4f50000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d0599d2f861d49f3c37b0ea1747f9c0000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000a4e2a1746b2f9c8f06f7e6d74a8dd70c8bd3218774562e884e65a4605c20324fc85ef2f4a752e4a1af6322c3ff88cf6f1d14f923d0cba8d16ef78b3799728690d13963c6a23a153572292449d8906e"], 0x508) mmap$snddsp_status(&(0x7f0000ffa000/0x3000)=nil, 0x1000, 0x3000000, 0x12, r0, 0x82000000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000080)=0x9) ioctl$DRM_IOCTL_MODE_GETENCODER(r0, 0xc01464a6, &(0x7f00000000c0)={0x4}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:45 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:45 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0x0, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1884.265725] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1884.348243] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1884.418882] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1884.463055] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1884.496697] device bridge_slave_1 left promiscuous mode [ 1884.508464] bridge0: port 2(bridge_slave_1) entered disabled state [ 1884.562397] device bridge_slave_0 left promiscuous mode [ 1884.568025] bridge0: port 1(bridge_slave_0) entered disabled state [ 1884.662476] device veth1_macvtap left promiscuous mode [ 1884.667843] device veth0_macvtap left promiscuous mode [ 1884.694258] device veth1_vlan left promiscuous mode [ 1884.699379] device veth0_vlan left promiscuous mode [ 1885.070836] bond15 (unregistering): Releasing backup interface veth43 [ 1885.099395] bond15 (unregistering): Releasing backup interface veth41 [ 1885.168491] bond15 (unregistering): Released all slaves [ 1885.216840] bond14 (unregistering): Releasing backup interface veth39 [ 1885.251811] bond14 (unregistering): Released all slaves [ 1885.260677] bond13 (unregistering): Releasing backup interface veth37 [ 1885.287349] bond13 (unregistering): Releasing backup interface veth35 [ 1885.347506] bond13 (unregistering): Released all slaves [ 1885.362963] bond12 (unregistering): Releasing backup interface veth33 [ 1885.408146] bond12 (unregistering): Released all slaves [ 1885.427390] bond11 (unregistering): Released all slaves [ 1885.438557] bond10 (unregistering): Releasing backup interface veth31 [ 1885.487351] bond10 (unregistering): Released all slaves [ 1885.498614] bond9 (unregistering): Releasing backup interface veth29 [ 1885.535151] bond9 (unregistering): Releasing backup interface veth27 [ 1885.598234] bond9 (unregistering): Released all slaves [ 1885.607523] bond8 (unregistering): Released all slaves [ 1885.618162] bond7 (unregistering): Releasing backup interface veth25 [ 1885.667624] bond7 (unregistering): Releasing backup interface veth23 [ 1885.726746] bond7 (unregistering): Released all slaves [ 1885.739134] bond6 (unregistering): Releasing backup interface veth21 [ 1885.786006] bond6 (unregistering): Released all slaves [ 1885.795835] bond5 (unregistering): Releasing backup interface veth19 [ 1885.846101] bond5 (unregistering): Released all slaves [ 1885.858947] bond4 (unregistering): Releasing backup interface veth15 [ 1885.895688] bond4 (unregistering): Releasing backup interface veth13 [ 1885.947432] bond4 (unregistering): Released all slaves [ 1885.955689] bond3 (unregistering): Releasing backup interface veth11 [ 1886.007897] bond3 (unregistering): Releasing backup interface veth9 [ 1886.058019] bond3 (unregistering): Released all slaves [ 1886.066393] bond2 (unregistering): Releasing backup interface veth7 [ 1886.116599] bond2 (unregistering): Releasing backup interface veth5 [ 1886.155909] bond2 (unregistering): Released all slaves [ 1886.213814] bond1 (unregistering): Releasing backup interface veth3 [ 1886.255742] bond1 (unregistering): Released all slaves [ 1886.335478] device hsr_slave_1 left promiscuous mode [ 1886.374926] device hsr_slave_0 left promiscuous mode [ 1886.420686] team0 (unregistering): Port device team_slave_1 removed [ 1886.436095] team0 (unregistering): Port device team_slave_0 removed [ 1886.448051] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1886.495356] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1886.560460] bond0 (unregistering): Released all slaves [ 1888.403460] IPVS: ftp: loaded support on port[0] = 21 [ 1889.269609] chnl_net:caif_netlink_parms(): no params data found [ 1889.344278] bridge0: port 1(bridge_slave_0) entered blocking state [ 1889.351327] bridge0: port 1(bridge_slave_0) entered disabled state [ 1889.362625] device bridge_slave_0 entered promiscuous mode [ 1889.369851] bridge0: port 2(bridge_slave_1) entered blocking state [ 1889.377169] bridge0: port 2(bridge_slave_1) entered disabled state [ 1889.386403] device bridge_slave_1 entered promiscuous mode [ 1889.414774] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1889.425082] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1889.449100] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1889.457099] team0: Port device team_slave_0 added [ 1889.464450] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1889.473092] team0: Port device team_slave_1 added [ 1889.493597] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1889.500170] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1889.529725] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1889.543508] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1889.552216] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1889.580235] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1889.592478] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1889.600834] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1889.665380] device hsr_slave_0 entered promiscuous mode [ 1889.703365] device hsr_slave_1 entered promiscuous mode [ 1889.742376] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1889.749882] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1889.839741] bridge0: port 2(bridge_slave_1) entered blocking state [ 1889.846967] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1889.853722] bridge0: port 1(bridge_slave_0) entered blocking state [ 1889.860284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1889.900441] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1889.908492] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1889.918879] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1889.929599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1889.938257] bridge0: port 1(bridge_slave_0) entered disabled state [ 1889.945998] bridge0: port 2(bridge_slave_1) entered disabled state [ 1889.959080] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1889.966866] 8021q: adding VLAN 0 to HW filter on device team0 [ 1889.977100] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1889.987937] bridge0: port 1(bridge_slave_0) entered blocking state [ 1889.994820] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1890.012069] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1890.019929] bridge0: port 2(bridge_slave_1) entered blocking state [ 1890.026614] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1890.042684] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1890.050875] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1890.060987] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1890.074934] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1890.088797] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1890.101441] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1890.107722] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1890.115707] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1890.133090] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1890.141141] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1890.148463] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1890.160792] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1890.230109] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 1890.241186] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1890.249933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1890.289496] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 1890.298364] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 1890.307510] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 1890.318969] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 1890.327032] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1890.335415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1890.346229] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1890.355081] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1890.365034] device veth0_vlan entered promiscuous mode [ 1890.377344] device veth1_vlan entered promiscuous mode [ 1890.384217] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 1890.395335] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 1890.410944] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 1890.422697] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 1890.430045] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1890.438293] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1890.448394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1890.457356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1890.468137] device veth0_macvtap entered promiscuous mode [ 1890.475512] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 1890.487280] device veth1_macvtap entered promiscuous mode [ 1890.494953] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 1890.506388] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 1890.518017] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 1890.528034] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1890.538536] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1890.548605] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1890.558759] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1890.568309] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1890.578439] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1890.587882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1890.598462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1890.608531] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1890.618786] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1890.629343] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 1890.637060] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1890.644919] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1890.654036] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1890.663064] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1890.672420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1890.684420] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1890.695007] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1890.704915] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1890.717573] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1890.727018] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1890.737519] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1890.748130] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1890.758285] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1890.768619] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1890.779346] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1890.790263] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 1890.797723] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1890.805999] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1890.815177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 21:33:53 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)="12b3eb99947fcbd11b", 0x9}], 0x1, 0x0) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:53 executing program 2: creat(0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x164142, 0x0) sendfile(r2, r3, 0x0, 0x80001d00c0d0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r6) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r6, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @empty}, r8}}, 0x38) write$RDMA_USER_CM_CMD_QUERY(r5, &(0x7f0000000000)={0x13, 0x10, 0xfa00, {&(0x7f00000000c0), r8, 0x2}}, 0x18) 21:33:53 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0x0, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:53 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:53 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc, 0x80}, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$smc(&(0x7f0000000180)='SMC_PNETID\x00') sendmsg$SMC_PNETID_DEL(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000001c0)={0x1c, r4, 0x1, 0x70bd2c, 0x0, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004850}, 0x0) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, r4, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv_slave_1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6tnl0\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040000}, 0x20080000) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000080)={0x0, {{0xa, 0x4e23, 0x9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x3ff}}, 0x0, 0x1, [{{0xa, 0x4e20, 0x9, @private1={0xfc, 0x1, [], 0x1}, 0x1}}]}, 0x110) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000340)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000000)={0x0}) r4 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ocfs2_control\x00', 0x8000, 0x0) ioctl$DRM_IOCTL_SWITCH_CTX(r4, 0x40086424, &(0x7f0000000080)={r3, 0x1}) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f0000000080)={r5, 0x1}) ioctl$DRM_IOCTL_NEW_CTX(r2, 0x40086425, &(0x7f0000000000)={r5, 0x3}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$nl_generic(r4, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2900000}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)={0x13c, 0x3c, 0x400, 0x70bd27, 0x25dfdbfb, {0xe}, [@nested={0x127, 0x10, 0x0, 0x1, [@generic="5ca8ef6c23b782520117e44f618115d9319c9ac43360a6ce609fcc2eb7a66f9a197e551f750ec720f36d3e70da6597e3dd1c6e8159fc08cac6e11855efeceb538c2fb22af1e7c1539adf1db5c157bec7d93873ef5c3a33c8bd72391771cc8b8cd761a561f505fe0e77e01c8a6eb4d2db6a8b5a366c34ffb890e805be6719d003593ac5919e32a2b0ea999024e8a08160ab8b1d58bc70310043abd87fbf9d458c556ba9d6bf77aa591899d75ed47224f3a159", @generic="2e45779f2141933b37d49dedc52381b14b4fcf702cf8ac3a1a84eb789f00f6fab7460d9144871f00f67c7033550eb6b4e17255fab5333e7c855ce2b3efe497adbfa7fd4580f693e11f2c546b6f98988e46031eb04b62e16fa78ae3aefaf462a09aa1d9bedcf22c8594c533b827f07ae1ce"]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x40}, 0x0) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = dup(r1) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r4, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x1407, 0x400, 0x70bd2a, 0x25dfdbfb, "", [@RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r7}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r8}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x4008000}, 0x4) ioctl$VIDIOC_S_STD(r2, 0x40085618, &(0x7f00000000c0)=0x400000) ioctl$EVIOCGABS2F(r7, 0x8018456f, &(0x7f0000000480)=""/1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) flock(r9, 0x1) [ 1892.188054] xt_TCPMSS: Only works on TCP SYN packets [ 1892.234362] xt_TCPMSS: Only works on TCP SYN packets [ 1892.266303] xt_TCPMSS: Only works on TCP SYN packets 21:33:53 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c00232a24771b5ea38780000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000900000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018420900000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d00000000000000000000000000000000000000000000000e81e646700"/1278], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x7}, 0x0) fcntl$setownex(r1, 0xf, &(0x7f0000000000)={0x2, r2}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r4, 0x300, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r6 = dup(r5) connect$rose(r6, &(0x7f0000000280)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$BLKRESETZONE(r6, 0x40101283, &(0x7f0000000240)={0x80, 0xffff}) flock(r3, 0x1) [ 1892.334838] xt_TCPMSS: Only works on TCP SYN packets 21:33:53 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:53 executing program 1: r0 = semget(0x2, 0x4, 0x1b0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_START(r2, 0x4142, 0x0) semctl$SEM_INFO(r0, 0x0, 0x13, &(0x7f0000000080)=""/192) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r3, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x4, 0x1, 0x201, 0x0, 0x0, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x4010) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:53 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0x0, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="e14e4129cbc07f77a1ae4ef335ccc205050122e409c50e8bc393000414c3cfd56f922858e597e7aed6d83605ccbad0afa16ff30600f7ffffff0625f0f45e37900e5c1c998de8f79949f45fbcaeeeffff00000000000000000000000000000024654c2a334116210128065cb43ad59a05c112b01f2a52299f1de750e651d033a3ce950fcee7d079ddf9bf3cb41e9d089ef0c76e66a3abcdbf36f5b53e752ee4347641635bb245287595b3e818238236d7ab593998e585f79544217d5ec5f305651c675939c3a68a683294647fb7c90e81f6334d7ebd983e218a0b8d8d93557c3b27d37f32c427780c3832122cbf92b69bd3a2fd23c2d913e6f71e545739", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000200)=0xf67, 0x8) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x20600, 0x0) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3, 0x6, 0x801, 0x0, 0x0, {0xa, 0x0, 0x6}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000014}, 0x8000) flock(r0, 0x1) 21:33:53 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uhid\x00', 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000480)={0x0, r3, 0xd66, 0x8000, 0x3, 0xeaf2}) [ 1892.605636] xt_TCPMSS: Only works on TCP SYN packets [ 1892.684667] audit: type=1800 audit(1589578433.792:239): pid=26084 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed" comm="syz-executor.2" name="bus" dev="sda1" ino=16783 res=0 21:33:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) flock(r0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fstatfs(r2, &(0x7f0000000140)=""/202) [ 1892.784304] xt_TCPMSS: Only works on TCP SYN packets 21:33:53 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:53 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="e14e4129cbc07f77a1ae4ef335ccc205050122e409c50e8bc393000414c3cfd56f922858e597e7aed6d83605ccbad0afa16ff30600f7ffffff0625f0f45e37900e5c1c998de8f79949f45fbcaeeeffff00000000000000000000000000000024654c2a334116210128065cb43ad59a05c112b01f2a52299f1de750e651d033a3ce950fcee7d079ddf9bf3cb41e9d089ef0c76e66a3abcdbf36f5b53e752ee4347641635bb245287595b3e818238236d7ab593998e585f79544217d5ec5f305651c675939c3a68a683294647fb7c90e81f6334d7ebd983e218a0b8d8d93557c3b27d37f32c427780c3832122cbf92b69bd3a2fd23c2d913e6f71e545739", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:53 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x2, 0x0, 0x7, 0x2, 0xfffffffffffffffe, 0x8000}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) perf_event_open(0x0, 0x0, 0xc, r2, 0xb) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = semget$private(0x0, 0x3, 0x142) semctl$SEM_STAT_ANY(r4, 0x2, 0x14, &(0x7f0000000080)=""/180) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d5030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e6a0000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d535300000000000000000000000000000000007f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:53 executing program 2: creat(0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x164142, 0x0) sendfile(r2, r3, 0x0, 0x80001d00c0d0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0xfffffd38}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r5, @ANYBLOB="ff000000000000001c0012000c000100626f6e64000000000c"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="5000000010001fff000000000008000000000000", @ANYRES32=0x0, @ANYBLOB="000000001900000028001200090001007665746800000000380002001400010000000000", @ANYRES32, @ANYBLOB="200002000010000008000a00", @ANYRES32=r5], 0x50}}, 0x0) r6 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) ioctl$SIOCAX25ADDUID(r6, 0x89e1, &(0x7f0000000000)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r8}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@loopback, 0x4e21, 0x100, 0x4e23, 0x6, 0xa, 0xa0, 0xa0, 0x3b, r5, r8}, {0x4, 0x1f, 0x401, 0x20, 0x7, 0x0, 0x80000000, 0x7}, {0xfff, 0x4, 0x6, 0x800}, 0x0, 0x6e6bbf, 0x3, 0x0, 0x2, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x3c}, 0x4d5, 0xff}, 0x2, @in=@empty, 0x3507, 0x0, 0x3, 0x1, 0xffff, 0xff, 0x101}}, 0xe8) [ 1892.837336] audit: type=1800 audit(1589578433.792:240): pid=26095 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="bus" dev="sda1" ino=16783 res=0 21:33:54 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000140)='./file0\x00', 0x101, 0x6) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000180)=0xb22) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r4 = dup(r3) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r1, 0x8982, &(0x7f00000001c0)={0x8, 'veth0_to_team\x00', {'bond_slave_1\x00'}, 0x5}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r4, 0xc0605345, &(0x7f0000000080)={0xd7, 0x2, {0x1, 0x2, 0xe9be, 0xa6e41813681b24ae, 0x389}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f0000000080)={0x0, 0xa, &(0x7f0000000180)={&(0x7f0000000000)={0x28, r3, 0x23f, 0x0, 0x0, {{}, {0x0, 0x410c}, {0xc, 0x14, 'syz1\x00'}}}, 0x28}, 0x1, 0xfffffff0}, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x30, r3, 0x800, 0x70bd2d, 0x25dfdbfc, {{}, {}, {0x14, 0x19, {0x1, 0x27, 0x0, 0x5}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x850}, 0x40010) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_GET_MSR_INDEX_LIST(r5, 0xc004ae02, &(0x7f00000001c0)={0x3, [0x0, 0x0, 0x0]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) flock(r6, 0x1) [ 1893.058115] xt_TCPMSS: Only works on TCP SYN packets 21:33:54 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:54 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) [ 1893.159140] xt_TCPMSS: Only works on TCP SYN packets 21:33:54 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:54 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r2) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000140)=0x5) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400201) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f00000000c0)=0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x4, 0x2}, 0x50001, 0x0, 0x0, 0x0, 0x40000000, 0xfffffffd}, r4, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r6 = dup(r5) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r6, 0xc0505405, &(0x7f0000000180)={{0x2, 0x1, 0x0, 0x0, 0x7fff}, 0x4, 0x800, 0x9}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xae44, 0xd7) flock(r7, 0x1) [ 1893.331171] xt_TCPMSS: Only works on TCP SYN packets [ 1893.473673] xt_TCPMSS: Only works on TCP SYN packets 21:33:54 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000ac0)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000b1ec7e2c0eb8e8c5258a22ebb41b6e774ae97f9e6ffa563161c106a1ac450e2adf640818aa2763038d2d67295a5daea6df621f50b6a516f6e2e1a2167d"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_procs(r1, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) flock(r2, 0x1) 21:33:54 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:54 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:54 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:54 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1893.690852] xt_TCPMSS: Only works on TCP SYN packets 21:33:54 executing program 2: creat(0x0, 0x0) utimes(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) r2 = socket$inet6(0xa, 0x400000000001, 0xfffffffd) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r5, 0x80605414, &(0x7f00000000c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$NL80211_CMD_DEL_STATION(r7, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0x24, 0x0, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@NL80211_ATTR_STA_FLAGS={0x8, 0x11, 0x0, 0x1, [@NL80211_STA_FLAG_AUTHORIZED={0x4}]}, @NL80211_ATTR_MGMT_SUBTYPE={0x5, 0x29, 0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000020}, 0x4) r8 = open(&(0x7f0000000280)='./bus\x00', 0x164142, 0x102) sendfile(r2, r8, 0x0, 0x80001d00c0d0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000240)=0x5) 21:33:54 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup(r2) ioctl$sock_ifreq(r2, 0x8923, &(0x7f0000000100)={'macvlan1\x00', @ifru_map={0x200, 0x100, 0x7, 0x80, 0x4}}) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000000140)=0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000b00)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8efca001f6d030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fef2a45f0264b01205615b989cee086cafd389ae5a2bc154f84d25e6e343c246acd28be246386a68ffca234b47b54fd74ebc08b1b0d8dae4b8cc1f323b429956d1b998b2ee93b64c8d9f2385447882b80f23804613d1c481c651488419398156593957c76f750119d53a23cfe7858623479fba9e2a48bdb8625a3ab92fba039f1f344a89de1e1ab4790deab3140cf6fd4f6c36019a1421f2c0b8c98078d2005d"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:54 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffc00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xdc85) flock(r1, 0x1) [ 1893.752454] xt_TCPMSS: Only works on TCP SYN packets [ 1893.832744] xt_TCPMSS: Only works on TCP SYN packets 21:33:55 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x7f, 0x202) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ocfs2_control\x00', 0x42080, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) keyctl$dh_compute(0x17, &(0x7f0000000180), &(0x7f0000000440)=""/243, 0x389, &(0x7f0000000080)={&(0x7f0000000240)={'crc32c-intel\x00\x03\x00\x00\x00\x00\x00\x01\x00'}}) keyctl$setperm(0x5, 0x0, 0xa0e00) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() perf_event_open(0x0, r3, 0xffffffffffffffff, r2, 0x9) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3100000000000000000000000000000000e8ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d535344afb1a6b1187b6bb6f5bb49fff5e60000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:55 executing program 5: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)={{0x0, 0xea60}, {r0, r1/1000+10000}}, 0x100) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_delete(r2) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) flock(r3, 0x1) 21:33:55 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:55 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x4800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) flock(r0, 0x1) 21:33:55 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000280)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d8030000030000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000abb60000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a30000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000309ac97bb6fe4f8157733165600b309e37bf049921f6d5eff7620ca4b4c9e273eeca9ac792c418f4cc6dd72acbf868bcf95688e2dd607bb3ca4be9ec8e1bee4759bc39e0395cd1ade2b546a92ebd5744cadfb481c0acb4b4d6c749f6a0544bfc94cb95fdb49b7a72ce81802c983b9e10995715fb95bdfa04000000000000004fddba72b06c71a0d929e2508db90f30d1bb51456ac179a5d8f6133f257f05cfbaa4b540275114d2ed54db23c8889af11fba928cc86875723c2ef9db5c6cc3fdfbc3b4a3baaa18832dd1693cd8db53aeedfb5e6608c6c19fe9864fae997c57e50c60444e3a2436e8bd9fed4c3835c4c7b891c6a818c224b46d9f7e00000000000000000000b2cf024b0f2759222d4a3b58f9dfba0a7d9c87e256fdfa4f40cfa76d91d59a5cc7eb3707012ff4e82427a3f73ec968d35b82487ec576b04a4a17fee7ac0f5a4314d2f6c921a8c0397195b240db88149db810a2b1e03bd5949e695805de3e7995c33b932537fd84849903bd704616fc5b0488fd3b44b2c917120188fdcdb69bed83878dca0b1a5c55bc8079f7ba31252d6143f258e1f9562142f9772bc41289c6c30f482869d2d8c9e935a3be3b9e69db80a9af43ebecb469a5760d4f100ed2c0b217982c7303766dac8972df2fcc0169d3a9f71209f58e9421a5b2ed273bd2587e04bec1870d50e464e100000000000000000000000025b926b48798bfe8de346a7fe85a9c97013486292387333f317404580c782de66ca4cc6b7bf118c43bb33b42ca974a01ad984a27d892e48a59d1cad539a715ab56489c1e6c786701aa8ec95e54ea843ed93cb7029d9090b36dd92e3e02896aa6817d5ab1672b"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f0000001a80)=""/4103) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:55 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40008, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flock(0xffffffffffffffff, 0x1) 21:33:55 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="e14e4129cbc07f77a1ae4ef335ccc205050122e409c50e8bc393000414c3cfd56f922858e597e7aed6d83605ccbad0afa16ff30600f7ffffff0625f0f45e37900e5c1c998de8f79949f45fbcaeeeffff00000000000000000000000000000024654c2a334116210128065cb43ad59a05c112b01f2a52299f1de750e651d033a3ce950fcee7d079ddf9bf3cb41e9d089ef0c76e66a3abcdbf36f5b53e752ee4347641635bb245287595b3e818238236d7ab593998e585f79544217d5ec5f305651c675939c3a68a683294647fb7c90e81f6334d7ebd983e218a0b8d8d93557c3b27d37f32c427780c3832122cbf92b69bd3a2fd23c2d913e6f71e545739", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:55 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0xc801, 0x0) write$ppp(r0, &(0x7f00000000c0)="c0b6d7c88a02f924536cc43efb9a085377b751f2568cc07fe5c89d15a0c9bbd8d54478a31318f34bf5ad99ac3cfaf5adac665a96d65d99dedf060c017a838390f78bdf3c64eaf5883ab1894c2d95023515ffe51c5dc6dcc63f6df40ecda9324fccbe351af8a40f305a576cae836bb7ed2ba3a972011f69c8f53b0ac587f8d6d2e31fc7f10a6c3592d25cc9ec18efcba0f564e6e1a3d6d142dcfda1d2e65c9392c09f9e68185e5aa8432c27f32fe90ee75ad5da6da9884eb80aa5faa062f3322b36dcf69df0b87718", 0xc8) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffff5cee, 0x0, 0x0, 0x3a5}, 0x0, 0xfffefffeffffffff, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000280)={{0x1, 0x3, 0x401, 0x2, 0x786c}, 0xffff, 0x3}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$IMGETCOUNT(r5, 0x80044943, &(0x7f00000001c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:55 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d8030000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000deffff01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000066000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000180100000000000000000000000000000000000000000000000028007270666969135888000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:55 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000140)={0x0, 0x2, 0x1, 0x5}) getsockopt$PNPIPE_IFINDEX(r3, 0x113, 0x2, &(0x7f0000000000), &(0x7f00000000c0)=0x4) flock(r1, 0x1) [ 1894.430721] audit: type=1800 audit(1589578435.532:241): pid=26232 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed" comm="syz-executor.2" name="bus" dev="sda1" ino=17042 res=0 21:33:55 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:55 executing program 2: creat(0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cuse\x00', 0x2, 0x0) sendfile(r2, r0, &(0x7f0000000500)=0xc83, 0x1ff) sendfile(r0, r1, 0x0, 0x80001d00c0d0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000480)) close(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x164142, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup(r7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) preadv(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x7ff) sendfile(r3, r4, 0x0, 0x80001d00c0d0) [ 1894.568780] audit: type=1800 audit(1589578435.562:242): pid=26223 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="bus" dev="sda1" ino=17042 res=0 [ 1894.606136] xt_TCPMSS: Only works on TCP SYN packets 21:33:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = getpid() r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/hci\x00') ioctl$KVM_S390_INTERRUPT_CPU(r4, 0x4010ae94, &(0x7f0000000300)={0x200, 0x2, 0x3f}) sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x7}, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x64c481, 0x0) ioctl$PPPIOCGIDLE(r5, 0x8010743f, &(0x7f0000000280)) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000140)={{0x4, 0x4, 0x6, 0x4, 'syz0\x00', 0x7}, 0x6, 0x0, 0x4, r3, 0x4, 0x0, 'syz0\x00', &(0x7f0000000000)=['mime_type[cpuset\x00', '$&vmnet1procmd5sumvboxnet0keyring#!\x00', ')*\x00', '\x00'], 0x39, [], [0x0, 0x8da, 0x2, 0x4]}) flock(r0, 0x1) 21:33:55 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16, @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:55 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d80300000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:56 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_ROPEN(r3, &(0x7f0000000200)={0x18, 0x71, 0x1, {{0x0, 0x4, 0x6}, 0x8}}, 0x18) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000240)=0x0) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x7}, 0x0) tgkill(r4, r5, 0x20) ioctl$SNDRV_PCM_IOCTL_WRITEI_FRAMES(r3, 0x40184150, &(0x7f0000000380)={0x0, &(0x7f00000002c0)="aab6bcafb08b0b269c2791c169e7f0099c4d7d89428c8bc6e7444cc06286a43939acf06d43f327b359b59c0e53f8bf7503a29692d1cf6a4c266ccf7ab60eb0c6176ba31bea080ff73c44e38a748e256d2971f0bf106e9a109639bb2c4689fb7eb341ef51cf9c5a3489fbec2158b0d7d887d9a405a002b74c7f88402eb6aa854d223ce3073dadd4e8de216c522c7dfa74d4ceaa3872", 0x95}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000140)={{0xff, 0x15}, 'port0\x00', 0x4c, 0x80000, 0x8001, 0x6, 0xfffffc01, 0x4, 0x4, 0x0, 0x0, 0x5}) r6 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VHOST_GET_VRING_BASE(r6, 0xc008af12, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r6, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x200}, &(0x7f00000003c0)=0x8) flock(r0, 0x1) 21:33:56 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000b40)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d80300000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050422c3e41890ce7690a840301f800726563656e740000000000000003000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dd8bbf72b5bf54ec8f000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000002100000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d5353000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000ec115a1479605661b5af085020cf737e80d80b7eb951af42c65332f7e28d8b3e1359cf69d0be9cf4c67738c8f77619f7e4078e75b814ec14b393a0bcf0341e833163d03343f9f277d2dfdf6ef1cdbe2bbed9e79d4cdb8084a955c953509964bcbed944f40e0879c9258960fa6a2e669d3ed85536761fee117144d3044d9f51bf9e54ff7073024ce704622ecc92210f92e31a8fa581c668c0b815f33fe4459f022c1336a464509aa57870b66e17ac7f4ec9505b9eafed2a0d40ad055428cf8d263e5e80c5bf"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:56 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:56 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000e80)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000aaab000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800728f682d08fc51bfd235fe176563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030292bba031d5ddfb6abd3bb3bbf57ac00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000022b52e90000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000eb0000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000fe6b9648cb2af66bd54e8576905e6307d67cf6f8f5f530087fd1f5dde1799da9662096cb"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$NFT_MSG_GETFLOWTABLE(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="20000000170a010200000000000000080c0000050900010022d36d1200000000"], 0x20}, 0x1, 0x0, 0x0, 0x4084}, 0x4000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setfsgid(0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000280)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000400)=[{&(0x7f00000001c0)="8cdf4258db5ed3b867c3eec622a5722304f05e08f52f612c8c4629e1e2608dc726dc470865f54a1662c0b976e6d4b0", 0x2f}, {&(0x7f0000000300)="db49df2fc1351a9806c9acc47140cda688bd220f04e1b4b64873d80fad3958b80ac9ead7984275bf1aaf441b29e32f0b54ff464534120db5abe8a72314069401862223fc0c9988015c4f55d26cfcbd2a5607ce9623dbc338c8e97f3876adbbf3f0939c2b8addd4643bf625f568e189cfce3c2a8db5d31dfa4fde5cebcb598dcb572f1c53661a7527d73f01c6176d5555007e0a5807205652ee4c9b6ffad45d639e53c44d951bfe2d5de365b206532e4f3b729796003cac40823c1556d99cb816176012644306a1", 0xfffffdf1}], 0x2, &(0x7f00000004c0)=[@cred={{0x1c}}], 0x20, 0x4040080}, 0x9) ioctl$PIO_FONTX(r4, 0x4b6c, &(0x7f0000000440)={0x6e, 0xe, &(0x7f0000000a80)="56ca9b6e34a1e96bea454341bb7c9712210bfbb0fe928c693c265fb41ba0b51dba2bfe4235a86ae7618e8b7e74327888e3d30564298213351b4c6214fa8311ce4c8e194297ae1934cf0f29476a40941ced7448c628b2f5cab9e39203d35e42625da1f5b295bc18b5e9c40f8eb347ca8d09415427f9685469f198bdd7c1140758ba94510774d4b7506ea1d7ab39609156ee76da7d8a95c4bfd649a805287396af42b2dbb97c517311e5540490cef52d139398905bc899bfb6e2d440c9e1f11dc2cdd7ae74db91941fec03dafba6f0966459c0841468bee626c48bbc86a4a8409e6c312c9f9a86eaff7920fffdf4f74e85662795091135b8375a1f47d3fc49fe77e010c62b6f759fa0f4a72c87e47607389d1507a5dea2abf9d52100ba64dc3a9bcb55f560e9535516493a13b4e3255e567d6813a39771e44480a611f4411070ec07b6da257266221ca48eef691b4b95bb8f3d3bf1dddf6feef3d21a8d2e97e2af22d186dce837c55318af132234705615522de608131a3e39426120236ea10cb28288ae9064f6b8a3da8bc65efe384aac1f62affe8be5f7e71548215ca2b81e0215abd7e1f418af0d955dc24a178e22098a0ec89a4574d07f11ba9a8dda869e1192930a987c73b9b81812d5fc93a9c27cb56985dd74e98aff7f37a12c3714182a3aae838b2013f1e03d6bd6c8fb23f7ac0fee0071adb9aa190642bb69e4ed5b1a6f3c5b9783b4aab84564237b70859d236407e9b4a261fa8f731ac2d7cdaf78e8787ad54f645c0ca21154e2379f61856e38dd4ac1b7906dc65bab3210999aac2e42f71c63041a9e8ba791be07278594c17c311c761c11da63acf2be8030c96deb852aab6f92c74b59343713d60ac5a904ba1d81856f75a1027a78642ec3e98e104051701bb07d019fc8cddf9556e729ef8587edd713772bd3f03d9fc1e10f07963b39a546ada519c6f73f8f8c9c36d50b775e72ff93e9e268f0286196a95af080aa80c15e575d2ab94421484ed4a413a852e6ba0300d1dcaa51d5ea96119a017d100771fab12b3af8a056e3da8cc96b06a1152b0e21e4d3c72ae671fe3b91d3395eeba77cc220ca8f6d0ad38a5f1100eeb2ff972430426b8c8c862d046c8d486bfa137cc4463681e7924d1668c86314d2a9fd8e3e0e4b82d02dcddb87dfe0fff1a0647ce448a190e7e65aa92607e81f1256d7002d98bc51f9abef65ba5025fc75d2435d8cecbbb2ce0bd97aa2f637010b008dd08a113dc0207b34f178b344617559b07d6ad9c58cea3d8d2c475421400c7854f4088d95c28146d9c221a6c6d331a660ad5f3e3593cf62e0a6ba0d76ca96d4762a82251c930d9911cdbd237fe6f7dcfe3b5a36593dfa18044a9507ff6f42ad9089d57895976d1b6445b6f0e057953101771ef9b974b6351834e8cf5c4721dfbf06fcdfa9125040c2b28593abcc81"}) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1894.898958] xt_TCPMSS: Only works on TCP SYN packets 21:33:56 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x4000, 0x0) connect$netlink(r3, &(0x7f00000005c0)=@kern={0x10, 0x0, 0x0, 0x400000}, 0xc) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000000)={0x6, &(0x7f0000000140)=[{@fixed}, {@fixed}, {@none}, {@fixed}, {}, {@fixed}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_SET_SIGNAL_MASK(r5, 0x4004ae8b, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) flock(r0, 0x1) 21:33:56 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r0, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:56 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=ANY=[], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1895.234853] audit: type=1800 audit(1589578436.342:243): pid=26302 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed" comm="syz-executor.2" name="bus" dev="sda1" ino=17009 res=0 21:33:56 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = dup(r1) name_to_handle_at(r3, 0x0, 0x0, &(0x7f0000000080), 0x400) 21:33:56 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) flock(r0, 0x1) 21:33:56 executing program 2: creat(0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0xc736) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000000)=@ccm_128={{0x303}, "d53f21117c29d10a", "ccc8689d71128d0f565a0aeb8fda0e3b", "fb2d92c3", "538685359b918f42"}, 0x28) close(r2) r5 = open(&(0x7f0000000080)='./bus\x00', 0x164142, 0x0) sendfile(r2, r5, 0x0, 0x80001d00c0d0) 21:33:56 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:56 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x40, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d80300000300000000000000000000000000000000000000000000d40000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008bb5f0d1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) getrusage(0x1, &(0x7f0000000080)) 21:33:56 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r0, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1895.412263] audit: type=1800 audit(1589578436.362:244): pid=26307 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="bus" dev="sda1" ino=17009 res=0 21:33:56 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xfffffffffffffff6, 0x4e0000) flock(0xffffffffffffffff, 0x1) [ 1895.500205] xt_TCPMSS: Only works on TCP SYN packets [ 1895.574111] xt_TCPMSS: Only works on TCP SYN packets 21:33:56 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:56 executing program 5: syz_genetlink_get_family_id$devlink(&(0x7f0000000000)='devlink\x00') getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f0000000140)=0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) flock(r0, 0x1) 21:33:56 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r0, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:57 executing program 5: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a91877b5ea0bdc9e158bd830000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725560a6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz', 0x1}, &(0x7f0000000100)="cf", 0x1, r1) keyctl$dh_compute(0x17, &(0x7f0000000180)={r2, r0, r2}, &(0x7f0000000440)=""/243, 0x389, &(0x7f0000000080)={&(0x7f0000000240)={'crc32c-intel\x00\x03\x00\x00\x00\x00\x00\x01\x00'}}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000000)='user\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) flock(r3, 0x1) 21:33:57 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="ff000000000000001c0012000c000100626f6e64000000000c"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="5000000010001fff000000000008000000000000", @ANYRES32=0x0, @ANYBLOB="000000001900000028001200090001007665746800000000380002001400010000000000", @ANYRES32, @ANYBLOB="200002000010000008000a00", @ANYRES32=r2], 0x50}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000003400)={'vxcan1\x00', r2}) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) getsockname$packet(r1, &(0x7f0000002f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000003740)=ANY=[@ANYBLOB="000000000000009c4309202f29a081dcc5d4d36b9e22e045dda34d37ad9b9df6ded836b6abc0ad7fcea0398a544e8f22cb8a35b5fe7d3a2d1226e6019cb010a15ecb5f72125dae9513ac936a3fac1c2371662502c0aec4a667325e93be38ef44300c396ba5fe4b6865f00b02cd36ff7e76637c9dbc62f2", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}, 0x1, 0x800000000000000}, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000035c0)=[{{&(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x26}}, 0x10, &(0x7f0000000200)=[{&(0x7f00000000c0)="021cd0", 0x3}, {&(0x7f0000000a80)="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", 0xfffffffffffffddd}, {&(0x7f0000000100)="a7a09a5fb167fa49125373a2828d6fcaeba9a819bc21be160f3a84467d62fda2a43e88d7939a03610e2483a2cc58c898d811c263ec958455a847e7c3c01e51c9b989fa8b8b8aa8f5cd0863a8c0a830e9ae3d16d7c4e3581e1cbe2defc4e4cff6a8acaa33f19a7c519b7e36d7fa3edaefad4cb9fa221bbffeafabedff8be18c8c2262d007d1650447abcb820a98ebeb7c5989cc40b99281d515b1111cc610af411c04ad0a3d8e45b3fb3bc8b19021deef61a30506cbc581eea370991d6ccae9a9bc9f6b98993524caec30901de2691f", 0xcf}], 0x3, &(0x7f0000000240)=[@ip_ttl={{0x14, 0x0, 0x2, 0x3}}], 0x18}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000280)="16c497e07183e2022f8caa46cbc8048a8e23266198e774437e506c31e3", 0x1d}, {&(0x7f00000002c0)="42589901c1f7079886b6d9c9aea966a0774a6681bcbb24d3878a06b6b357c3f17b03eb8e529ea9ec7ed27def2e545d3a6c562b8031d9531e5ba0979664eb4069caba07245648f76872bac453befa64f6de4e6e8d8d9abee12d868d3ff354fdbf7d231baefd9cfd0c14b7a6bb169b02216242dc2ef4b3f292ece2e5560f7711f9bd52459814f6d3654a1c306a476a", 0x8e}, {&(0x7f0000000380)="871e10e8ea594bf706e34e67b6c3ebbfd9e329366ced2e408696bdc5439849c2d2a26a05894193412d7d98eed3e24c0478ff0d9e26cdf00e6f401b0f97f96ec9bac5b28db6d24ba97a90f2773cc5e305c6b67712bd05b1836c2a6371664acba7d6e9270f6c04102be2a70157a20ec52de4d0e5aea5712782661a93213263dc8816a00f924d2f3ec55536c454716388908df6da52ccdc9f984c57b2c8c91a1e8c298e", 0xa2}], 0x3, &(0x7f0000000480)=[@ip_ttl={{0x14, 0x0, 0x2, 0x3}}], 0x18}}, {{&(0x7f00000004c0)={0x2, 0x4e22, @multicast2}, 0x10, &(0x7f0000001bc0)=[{&(0x7f0000001a80)="f340989f03e42e3ee6e3e70b0ddb7f999471063ba61daef50f27ec4b26dc7799e1b295d68a2f480ec45717581fca2bc7e1405d18651e05e71bb6cc478d964ef009dab1436ac2562a575b77e368eaa0c478510b2b57936c40a70a7375e3f3ecd4ecb110776b1ba887203f0d31d1875ea355eab4077c18b97a4f15387adc0f93c9fccec6cd2126f3254bc79849e8b00d1eec090f22dbfa56dd27839588374ff0255c7581d5b0ce82203f43537798335882db758d2c5a7be9f3edd51aa99356dfdde2c9083330a31d4673ebb57037a870098a2d3e9e2ec531d33f7a2be665638f4266557154cda88bf2ffb966dc15a2b88531e595e630e3", 0xf6}, {&(0x7f0000000500)}, {&(0x7f0000001b80)="eb19f4535590e6d3977e21d485f2816821e4aca7d94b7327e15b7d2f00ddeb7f92c3b449483dd8a7b2f1832fb2cb4bc0d3b1e22d4c397687528e1ad7606300", 0x3f}], 0x3}}, {{&(0x7f0000001c00)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000003340)=[{&(0x7f0000001c40)="09eba22d2de454f51a1b0d24c97a80a052e05523aff38372b5020aa502f9ce42c955a36a812cc740aecff58e375785bd3d1a46892e1abaf0edd66abef5e76f0308cb67bef5e9d873dfc08b736c8c3a429afe9304e07766574251c5621966c512dce07f3e323f8d12386c9589b2ab56ac3181b71eca15471e0dd7ef2c1e53f97617aeebc0d478ccb5ac5437a8a22be49ab8a67fa6e98b192227ac68e88ae360f64c7690dff482b9a31a555a935f0205bdbf185f81cc1cf6982f618e07cc4c196dc6426bcdc0f6aaf89fab017c4e07832b64a8ea87fe40c80baf50aff8fb8cc24d0c2945e8f9799db9a0603840e85e817fa8eb5920", 0xf4}, {&(0x7f0000001d40)="155394137b1d58279d1f8d4de47b10fd3e3ff891f7a854923c979c2b18242124ed941dff3c63b05e68ab60bbd5bc43648aad5c1fb89b1120bb8def311b0363df5d1739fe3d9dfcae9c155de571510f5a170852f470a5109d3c4a9561b5afffc38ab64a82e19dc3e8b22503e833c959c9728299e431a3c1703988bfd46c121ff09d89a3883d11d3eb64de030816c21ffffc2689efa8a66d6831f1f3be7e8ad0469282cd7b2bceeef27de3a1568dc5d694294402a6bfc6b167f67e84c5800550f73a78ca24dcb49e465834574cb704a89183c489dc77fbba21341759994baba3bfb32bcf4f1ec2c2f2389c9c515a91886e07aadd15e1cb", 0xf6}, {&(0x7f0000001e40)="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", 0x1000}, {&(0x7f0000002e40)="ec66b472f7907092d3b2da0fe8e54c1004b1b577e9703d009c8fe8403c4eb2be4d0fc192d1c35908bc", 0x29}, {&(0x7f0000002e80)="480a147c4d4fd0a6c814c85da04aa7475a1712871140a71b5cab1312e0fa40378247bdbf5e878dc9264cc60653055dcac4b139e579b08f5e2e6ff2150abcf9d57f70c7bdc2e084191478ab0d5922671daceb4fbc778447afd466af4967e887c07c4418b0ae394300545f0516cdaa021f803e76866dbac4e09309231a6a879038c02e7bfeed8f54e590f9f43b32649730ff5b517d1e2347cdd04c6019bf3290b7fca39e036747184aaf5331df7fef", 0xae}, {&(0x7f00000036c0)="326e543dc0ab75be411083bb13499a24a76719e85344fdd7798c2844fc21b57166187e158aed176bd7775774c17336bd1ba13787901a7f48a149758d93bae977790a471eee2989cc64ebe590ae02550c03e311a709a94b97ae86638f797229553b", 0x61}, {&(0x7f0000002fc0)="7d06ef23614090c80e603966ecc2d56c66158393abde994188a813023badd4d1affcb9cbf63cabf34fd2689e8a64eba766e888da796efcec8f83cad06c6c878759c3b664ec32935609488f51d649048aae8732d6059fe597cb551ba3de96cd78bf6cf5ee66e9fa62edc6e4a8ca94a97a31c3f33b902713b65cde4daf03f2a4235060a484fd242747ad1a3e0ca50a0ae3b5d04523b37fcbdb87d65c6b416417e82f83dd6943b0df2c56fefd6f6c14132075d7067c82362b144afa0a9ec5d0fc73c899b3b373", 0xc5}, {&(0x7f00000030c0)="d29ba2c745b7fc3a57e40d0f9fbe90608495cc3f38cb856d1ed8869b2195d4ec51c8e02c090f3d10b6f8b33646f8af51a1607a1332a8fdafa0df53de11a2a22795b576c41baa0635c49174d91456965d60878c6aa216af3b20d80c13043eb14b1c9891f84e4cb1868726e62a08f7d93adb8f0fb75148b1fb68f8b94b34822b72753dcbd4e5e8b9d657008cca2d4ad2ddfd51a2a7645e5a4531c9e3dde91880dfd802d763619df555", 0xa8}, {&(0x7f0000003180)="42b46c3d00bfb78a96e1af0d59098ff1622da532d0af315dbd76c1b485a869751c300a7d4aafcbc62a5c61828e2a65a4abd3fde6b3624753a083f112502c2fd73d6f597e8a2f767e3be5f282cde4566a109f9ca1b2a483bb381ac3be8bc8ae29ada8ae56ac3f029afd19c2d51f8124b45a6fb97ec2f13c916fdd3c32cc856887dacc0015c3ebd029129b5e4dfdbb2cb7f546", 0x92}, {&(0x7f0000003240)="9a3b84217b4c9050f49db7cd6b39e69f484a27dddc9ac09022dbfc4b506cca58d09645a70cd99d3f56a021ae5d79cb450505100b03956aa0af10f24a15ed87883c309c139a62f0bba4b48f68d29712a5e59e92076d61ae37dd4723ed0abe12e13e37b78f6a39cac15ab45c8fbc825a0988eb041311356fa452bf54897f5f608dd2285614fbcd56744292696bd12a92c1537902c92afe480e485fce614fc36086923e1d9d7361ec30165d3baa4bb994b1097eeb3137506ad2bd211d3d2669bc6b5014", 0xc2}], 0xa, &(0x7f0000003440)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @broadcast}}}, @ip_retopts={{0x68, 0x0, 0x7, {[@timestamp={0x44, 0x14, 0x9, 0x0, 0x9, [0x9, 0xff000000, 0x100, 0x2919]}, @timestamp={0x44, 0x24, 0xb0, 0x0, 0xb, [0x288f16d7, 0x1, 0x100, 0x2000000, 0xcdd0, 0x4, 0x3, 0x200]}, @cipso={0x86, 0x1c, 0x2, [{0x2, 0x5, "94f7bd"}, {0x2, 0x2}, {0x1, 0x2}, {0x1, 0x2}, {0x2, 0xb, "e1a6ec341d5d7c5a29"}]}, @noop]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @empty, @multicast2}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x10001}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x32}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7f}}, @ip_retopts={{0x30, 0x0, 0x7, {[@lsrr={0x83, 0x1f, 0x7b, [@multicast1, @broadcast, @rand_addr=0x64010102, @rand_addr=0x64010100, @private=0xa010100, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}], 0x168}}], 0x4, 0x8040) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:57 executing program 2: creat(0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb01001800000000000000060100000601000004000000080000000000000c020000000f0000000100000508000000030000000100000001000000020000000700000f02000000030000000500000007000000050000000000000001000000030000004d000000ffff000005000000030000000002000003000000d0d70000dc69ffff0400000071ce2904060000000300000001000000320000003e650c0000000000000c020000000d0000000a0000062cfb000010000000145e0000060000000500000005000000001000000e000000070000000d000000060000000b0000000300000009000000b20b0000090000000000000008000000010000000d0000a1a6e242000000000000000003000000000500000003000000010000000000002e3000"], &(0x7f0000000200)=""/4096, 0x124, 0x1000}, 0x20) sendfile(r0, r1, 0x0, 0x80001d00c0d0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x164142, 0x0) sendfile(r2, r3, 0x0, 0x80001d00c0d0) [ 1896.008371] xt_TCPMSS: Only works on TCP SYN packets 21:33:57 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r0, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:57 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0xfffffffe, @local, 0x2}, 0x1c) flock(r0, 0x1) 21:33:57 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:57 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000140)={0x0, @reserved}) r1 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000000)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r3}) ioctl$SIOCAX25DELUID(r0, 0x89e2, &(0x7f0000000080)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, r3}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:57 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) flock(r0, 0x1) r1 = msgget(0x3, 0xc) msgrcv(r1, &(0x7f0000000140)={0x0, ""/173}, 0xb5, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFBRDADDR(r3, 0x891a, &(0x7f0000000000)={'veth1_to_bond\x00', {0x2, 0x4e20, @private=0xa010101}}) 21:33:57 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r0, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1896.253766] xt_TCPMSS: Only works on TCP SYN packets [ 1896.351637] xt_TCPMSS: Only works on TCP SYN packets 21:33:57 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:57 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup(r1) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x7}, 0x0) fcntl$setown(r1, 0x8, r2) [ 1896.440322] audit: type=1800 audit(1589578437.542:245): pid=26400 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed" comm="syz-executor.2" name="bus" dev="sda1" ino=16799 res=0 21:33:57 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCX25SFACILITIES(r3, 0x89e3, &(0x7f0000000040)={0xe2, 0x6, 0xc, 0xa, 0x8}) creat(0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000000)=0x8000) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x80001d00c0d0) r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) r7 = open(&(0x7f0000000080)='./bus\x00', 0x164142, 0x0) sendfile(r6, r7, 0x0, 0x80001d00c0d0) 21:33:57 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r0, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1896.547362] audit: type=1800 audit(1589578437.552:246): pid=26425 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="bus" dev="sda1" ino=16799 res=0 21:33:57 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000047dc4e7d6760b0807f09e85948c13b000000000000000000000000000000000000000000000000000000001e0000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000280)={0xa5, 0x19, &(0x7f00000004c0)="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"}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x43}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r2, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r3}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000180)='\x00', r3}, 0x30) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x5, 0x9, 0x1, 0x9, 0x0, 0x0, 0x20000, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3d, 0x4, @perf_config_ext={0x2, 0x8}, 0x40400, 0x3, 0x4, 0x6, 0x100000001, 0x8, 0x6}, r4, 0x6, 0xffffffffffffffff, 0x1) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1896.611707] xt_TCPMSS: Only works on TCP SYN packets 21:33:57 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:57 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r0, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={0x0, 0x4}}, 0x0) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:58 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @empty}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6c, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={r4, 0x6, 0x3ff, 0xe77, 0x5, 0x100}, 0x14) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000500000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:58 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_GET_STATUS64(r3, 0x4c05, &(0x7f0000000280)) bind$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x9, @none, 0xdc5, 0x3}, 0xe) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1897.097847] audit: type=1800 audit(1589578438.202:247): pid=26433 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed" comm="syz-executor.2" name="bus" dev="sda1" ino=16790 res=0 21:33:58 executing program 2: creat(0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) r2 = socket$inet6(0xa, 0x400000000001, 0x102) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x164142, 0x0) sendfile(r2, r3, 0x0, 0x80001d00c0d0) [ 1897.164279] audit: type=1800 audit(1589578438.222:248): pid=26452 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="bus" dev="sda1" ino=16790 res=0 21:33:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000140)={0x3b, 0x3, 0x4, 0x20000, 0x4ca4669a, {}, {0x3, 0x8, 0x1f, 0x4, 0x0, 0x9, "00000002"}, 0x0, 0x1, @offset=0x81, 0x1, 0x0, 0xffffffffffffffff}) ioctl$RTC_UIE_OFF(r0, 0x7004) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socket(0x15, 0x800, 0x1) flock(r1, 0x1) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x54, 0x2, 0x9, 0x3, 0x0, 0x0, {0x7, 0x0, 0x5}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x3}}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_STATUS={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x51}, 0xc004) 21:33:58 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r0, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={0x0, 0x4}}, 0x0) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1897.229378] xt_TCPMSS: Only works on TCP SYN packets [ 1897.275847] xt_TCPMSS: Only works on TCP SYN packets 21:33:58 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:33:58 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept$packet(r0, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000ac0)=0x14) sendmsg$inet6(r1, &(0x7f0000000d80)={&(0x7f0000000400)={0xa, 0x4e24, 0xffff7fff, @ipv4={[], [], @rand_addr=0x64010101}, 0xff}, 0x1c, &(0x7f0000000500)=[{&(0x7f0000000440)="77503e8435d675a5602dc5c590cc94640a700db468b371c569bb55b7e9833f4fbce442521ef1bd45ea16c28f0f7542c07ccb19f6bff55e471f06c7df95cb9809a1a536f8d08f6e39bd891d1797546b2e4c09fea4a65eb4fcd11cbf7c7a50e63a474682fba0d961018fbf9d3bb5539b3bde53946168e4b540d81e98d071c84b10cbcf17a050c28c6d90d1bade987cbd0ef94303958344780e75c41c7fef2247a848102c5c88393d6fea4783e5bcfc26862ef354ffef8e98fbca89", 0xba}], 0x1, &(0x7f0000000b00)=[@rthdr_2292={{0x48, 0x29, 0x39, {0x88, 0x6, 0x1, 0x6, 0x0, [@private0={0xfc, 0x0, [], 0x1}, @mcast1, @private1]}}}, @tclass={{0x14, 0x29, 0x43, 0x4}}, @dstopts={{0x130, 0x29, 0x37, {0x2c, 0x22, [], [@calipso={0x7, 0x30, {0x2, 0xa, 0x3, 0x5, [0x9, 0x7, 0x80000001, 0x87, 0x0]}}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @pad1, @hao={0xc9, 0x10, @private2={0xfc, 0x2, [], 0x1}}, @jumbo={0xc2, 0x4, 0xd44}, @hao={0xc9, 0x10, @private0}, @enc_lim={0x4, 0x1, 0x40}, @generic={0x0, 0xa7, "158dc19618ad7882169dec17de255960c42cdb56a3f09cb2168361ec28a7b484a43a55b1a3a7261118c49640e5bd51f52ef63b64386380645fe4f243f7dab0379ad84bead54e1c38834ed754d44199b59655707568a5864884c0db98cba7a12d29f9078e051f3f6c05c9f5aaefa712d74896beb089c6d54ec0308db89abab1f1f889b9c703492712ba944c384cf429cfd56d0244dbecc3bd274f833511e69b7f78bc09dab8e0c5"}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0xfff}}, @pktinfo={{0x24, 0x29, 0x32, {@remote, r2}}}, @hoplimit={{0x14, 0x29, 0x34, 0x9}}, @dstopts={{0x48, 0x29, 0x37, {0x4, 0x5, [], [@hao={0xc9, 0x10, @remote}, @pad1, @pad1, @jumbo={0xc2, 0x4, 0x7}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x8}, @pad1]}}}, @tclass={{0x14, 0x29, 0x43, 0xffffffff}}, @tclass={{0x14, 0x29, 0x43, 0x4}}, @dontfrag={{0x14, 0x29, 0x3e, 0x7f}}], 0x278}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x8) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$pppl2tp(0x18, 0x1, 0x1) recvmsg(r3, &(0x7f00000001c0)={&(0x7f0000000080)=@ipx, 0x80, &(0x7f0000000180)=[{&(0x7f0000000100)=""/91, 0x5b}], 0x1}, 0x2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) recvmsg(r5, &(0x7f00000003c0)={&(0x7f0000000200)=@ipx, 0x80, &(0x7f0000000340)=[{&(0x7f0000000280)=""/182, 0xb6}], 0x1, &(0x7f0000000380)=""/26, 0x1a}, 0x2003) 21:33:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr$trusted_overlay_opaque(r2, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x6) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000000)) flock(r0, 0x1) 21:33:58 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000280)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002800000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000048004354d2fd2b1e00000000000000000000000000000000000000000000000000000000000000000000000073797a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007300000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000cc951af2a78d913411f9ad56ab141930cd3f9723a54875dd2d39da0e8ee3fd6aeeffde6b8a2d313f9ee2f6d8fbd09e7e925eedff3b578f04c83b02bec9d5f20000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) [ 1897.380241] xt_TCPMSS: Only works on TCP SYN packets 21:33:58 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000130000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e74000000000000000000000000000000000000000000000000000000000000000001005d384cae0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = dup2(0xffffffffffffffff, r2) ioctl$KVM_XEN_HVM_CONFIG(r3, 0x4038ae7a, &(0x7f0000000180)={0x6, 0x996, &(0x7f00000000c0)="f56700614ddfaf2d624f3d3da7aacf2d0a6996b0e89d59c2070ff76e6295f611943f586ea8c0f83840959e1ab204af0eda002c1acd6f4566a6ee2dff57aac80740ffd147da64a44a489f0ada658f42e732620a48c676b90b45923b6367c1d6bf9f2b9477fc4e3395289e04", &(0x7f0000000140)="81c61f9f2914484089b0169c951e642c494e78072ce3e40b72103c861cce03f9803f397ec817b7e57b", 0x6b, 0x29}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:33:58 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) flock(r1, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PIO_FONTRESET(r3, 0x4b6d, 0x0) ioctl$FIONCLEX(r0, 0x5450) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000140)="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") 21:33:58 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r0, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={0x0, 0x4}}, 0x0) write$P9_RATTACH(r0, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r2 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') 21:33:58 executing program 2: creat(0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x164142, 0x1b1) sendfile(r2, r3, 0x0, 0x80001d00c0d0) [ 1897.688198] xt_TCPMSS: Only works on TCP SYN packets 21:33:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$RTC_UIE_OFF(r3, 0x7004) bind$bt_hci(r1, &(0x7f0000000000)={0x1f, 0x3, 0x3}, 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) flock(r4, 0x1) 21:33:58 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) [ 1897.778012] xt_TCPMSS: Only works on TCP SYN packets 21:33:59 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0xda, 0x0, 0x0, 0x1, 0x1420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000ac0)=ANY=[@ANYBLOB="72617700000000000000000000000000006ea923ce4000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d80300000300000000000000000001000000000000000000db11000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e8ffffff00020000000000000000000000000000000000000000000000000000000000000000000000001e97e49b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d535300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000b883e2d02ddec32c00000000000000baaa4111d06bb146b696fef77d0aee01ff776744a59323fab276691e240744009029379b2dc9037955f1304374573f78dc64280186e65795762cae70cdfaf8d17b00"/1352], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080)={r2, r4, 0x0, r6}, 0x10) 21:33:59 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/247, 0xf7}], 0x1, &(0x7f0000000a80)=""/4096, 0x1000}, 0x40000002) 21:33:59 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1898.007213] xt_TCPMSS: Only works on TCP SYN packets 21:34:01 executing program 2: creat(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{}, {}, {}]}) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x164142, 0x0) sendfile(r4, r5, 0x0, 0x80001d00c0d0) 21:34:01 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 21:34:01 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f00000000c0)=0x6) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0xc0022, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:34:01 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1900.392582] xt_TCPMSS: Only works on TCP SYN packets [ 1900.479732] xt_TCPMSS: Only works on TCP SYN packets 21:34:01 executing program 3: getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={0x0, 0x7, 0x7a, 0x8001, 0x0, 0x0, 0x0, 0x1f, {0x0, @in={{0x2, 0x4e24, @local}}, 0x0, 0x0, 0x0, 0xffffffff, 0x5f1}}, &(0x7f0000000140)=0xb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) pipe(0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) mlock2(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000540)='./file0\x00', 0x0, 0x5010, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000300)='.', 0x0, 0x5010, 0x0) ioctl(0xffffffffffffffff, 0xc0000000, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) [ 1900.627396] kauditd_printk_skb: 1 callbacks suppressed [ 1900.627404] audit: type=1800 audit(1589578441.732:250): pid=26554 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed" comm="syz-executor.2" name="bus" dev="sda1" ino=15762 res=0 21:34:01 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000080)=0x2) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f00000000c0)=0x5) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:34:01 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x6, 0xa2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2d00, 0x202, 0x2, 0x0, 0x3, 0x36}, 0x0, 0xa, 0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=""/56, 0x0, 0x38, 0x1}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1561, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x10) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, 0xfffffffffffffffe, {0xc6}}, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYRES32=r0, @ANYBLOB="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", @ANYRES16], 0x4}}, 0x0) write$P9_RATTACH(r1, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x0, 0x4, 0x4}}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x8) renameat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000480)='./bus\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/llc/socket\x00') rmdir(&(0x7f0000000400)='./file0\x00') [ 1900.704763] audit: type=1800 audit(1589578441.732:251): pid=26569 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="bus" dev="sda1" ino=15762 res=0 21:34:01 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000080)=0x1ff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c103000003000000a8040000d8030000000000000000000000000000c0020000d8030000d8030000d8030000d8030000d803000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000009802c002000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000000000000000000000010073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028005443504d53530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d00018010000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x508) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) 21:34:01 executing program 2: r0 = creat(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$l2tp(0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={0x2c, r3, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}]}, 0x2c}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) ioctl$TUNSETOWNER(r0, 0x400454cc, r4) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="02002cbd7000fddbdf250600000001353a0206000e000200000006001a004e24000008001100000000001400080076657468305f6d0600767461"], 0x40}, 0x1, 0x0, 0x0, 0x20008000}, 0x40) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) r6 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) r7 = socket$inet6(0xa, 0x400000000001, 0x0) close(r7) r8 = open(&(0x7f0000000080)='./bus\x00', 0x164142, 0x0) sendfile(r7, r8, 0x0, 0x80001d00c0d0) fchdir(r1) [ 1900.799617] xt_TCPMSS: Only works on TCP SYN packets [ 1900.866231] device ip6gretap0 left promiscuous mode [ 1900.937826] xt_TCPMSS: Only works on TCP SYN packets [ 1901.413933] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1901.420818] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1901.452750] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1901.459622] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1901.495693] device bridge_slave_1 left promiscuous mode [ 1901.512406] bridge0: port 2(bridge_slave_1) entered disabled state [ 1901.566255] device bridge_slave_0 left promiscuous mode [ 1901.581823] bridge0: port 1(bridge_slave_0) entered disabled state [ 1901.627917] device veth1_macvtap left promiscuous mode [ 1901.633386] device veth0_macvtap left promiscuous mode [ 1901.991982] bond21 (unregistering): Releasing backup interface veth65 [ 1902.037538] bond21 (unregistering): Releasing backup interface veth63 [ 1902.117126] bond21 (unregistering): Released all slaves [ 1902.137444] bond20 (unregistering): Releasing backup interface veth59 [ 1902.167139] bond20 (unregistering): Releasing backup interface veth57 [ 1902.228205] bond20 (unregistering): Released all slaves [ 1902.238511] bond19 (unregistering): Releasing backup interface veth55 [ 1902.298238] bond19 (unregistering): Releasing backup interface veth53 [ 1902.357727] bond19 (unregistering): Released all slaves [ 1902.373381] bond18 (unregistering): Released all slaves [ 1902.382958] bond17 (unregistering): Releasing backup interface veth49 [ 1902.437426] bond17 (unregistering): Releasing backup interface veth47 [ 1902.503971] bond17 (unregistering): Released all slaves [ 1902.523288] bond16 (unregistering): Releasing backup interface veth43 [ 1902.577893] bond16 (unregistering): Released all slaves [ 1902.592799] bond15 (unregistering): Releasing backup interface veth41 [ 1902.637916] bond15 (unregistering): Released all slaves [ 1902.653762] bond14 (unregistering): Released all slaves [ 1902.669558] bond13 (unregistering): Released all slaves [ 1902.692673] bond12 (unregistering): Releasing backup interface veth37 [ 1902.739405] bond12 (unregistering): Released all slaves [ 1902.760164] bond11 (unregistering): Released all slaves [ 1902.789786] bond10 (unregistering): Releasing backup interface veth29 [ 1902.838072] bond10 (unregistering): Released all slaves [ 1902.874320] bond9 (unregistering): Released all slaves [ 1902.890187] bond8 (unregistering): Releasing backup interface veth21 [ 1902.959289] bond8 (unregistering): Released all slaves [ 1902.973867] bond7 (unregistering): Releasing backup interface veth19 [ 1903.018829] bond7 (unregistering): Released all slaves [ 1903.033995] bond6 (unregistering): Releasing backup interface veth17 [ 1903.088072] bond6 (unregistering): Released all slaves [ 1903.123261] bond5 (unregistering): Released all slaves [ 1903.137778] bond4 (unregistering): Releasing backup interface veth11 [ 1903.201519] bond4 (unregistering): Releasing backup interface veth9 [ 1903.261339] bond4 (unregistering): Released all slaves [ 1903.290077] bond3 (unregistering): Releasing backup interface veth7 [ 1903.366656] bond3 (unregistering): Releasing backup interface veth5 [ 1903.427645] bond3 (unregistering): Released all slaves [ 1903.447787] bond2 (unregistering): Releasing backup interface veth3 [ 1903.512308] bond2 (unregistering): Released all slaves [ 1903.533701] bond1 (unregistering): Released all slaves [ 1903.684605] device hsr_slave_1 left promiscuous mode [ 1903.726280] device hsr_slave_0 left promiscuous mode [ 1903.796571] team0 (unregistering): Port device team_slave_1 removed [ 1903.824167] team0 (unregistering): Port device team_slave_0 removed [ 1903.853784] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1903.882233] device bond_slave_1 left promiscuous mode [ 1903.898963] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1903.941697] kasan: CONFIG_KASAN_INLINE enabled [ 1903.946726] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 1903.964409] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 1903.970676] Modules linked in: [ 1903.973929] CPU: 0 PID: 22 Comm: kworker/u4:1 Not tainted 4.14.180-syzkaller #0 [ 1903.981455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1903.990823] Workqueue: netns cleanup_net [ 1903.994885] task: ffff8880a9a1e5c0 task.stack: ffff8880a9a28000 [ 1904.000958] RIP: 0010:hsr_netdev_notify+0x456/0x8c0 [ 1904.005976] RSP: 0000:ffff8880a9a2f788 EFLAGS: 00010202 [ 1904.011455] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 1ffffffff10279fc [ 1904.018904] RDX: 0000000000000002 RSI: ffffffff886e4a20 RDI: ffff8880908f6520 [ 1904.026181] RBP: ffff8880596559c0 R08: 0000000000000001 R09: 0000000000000004 [ 1904.033452] R10: ffff8880a9a1eee8 R11: ffff8880a9a1e5c0 R12: ffff888054955850 [ 1904.040875] R13: ffff888054955840 R14: 0000000000000001 R15: dffffc0000000000 [ 1904.048353] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 1904.056586] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1904.062467] CR2: 00007fbacfe31180 CR3: 00000000a91ef000 CR4: 00000000001406f0 [ 1904.069746] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1904.077057] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1904.084326] Call Trace: [ 1904.086923] notifier_call_chain+0x107/0x1a0 [ 1904.091339] call_netdevice_notifiers+0x5e/0x70 [ 1904.096018] ? call_netdevice_notifiers_info+0x60/0x60 [ 1904.101307] __bond_release_one+0xf02/0x1390 [ 1904.105727] ? rt_flush_dev+0x1f9/0x290 [ 1904.109706] ? bond_enslave+0x49e0/0x49e0 [ 1904.114030] ? save_trace+0x290/0x290 [ 1904.117832] ? mark_held_locks+0xa6/0xf0 [ 1904.121906] ? __local_bh_enable_ip+0x94/0x190 [ 1904.126525] ? __lock_is_held+0xad/0x140 [ 1904.130601] bond_netdev_event+0x784/0x8c0 [ 1904.134844] notifier_call_chain+0x107/0x1a0 [ 1904.139273] rollback_registered_many+0x694/0xa70 [ 1904.144223] ? netdev_info+0xf0/0xf0 [ 1904.147949] unregister_netdevice_many.part.0+0x16/0x1d0 [ 1904.153412] default_device_exit_batch+0x2dd/0x380 [ 1904.158355] ? unregister_netdevice_many+0x50/0x50 [ 1904.163297] ? do_wait_intr_irq+0x270/0x270 [ 1904.167635] ? cfg80211_switch_netns+0x460/0x460 [ 1904.172398] ? unregister_netdevice_many+0x50/0x50 [ 1904.177337] ? dev_change_net_namespace+0x9d0/0x9d0 [ 1904.182368] ops_exit_list.isra.0+0xef/0x140 [ 1904.187747] cleanup_net+0x3bb/0x820 [ 1904.191469] ? net_drop_ns+0x70/0x70 [ 1904.195202] ? __lock_is_held+0x90/0x140 [ 1904.199621] process_one_work+0x813/0x1540 [ 1904.203885] ? pwq_dec_nr_in_flight+0x2b0/0x2b0 [ 1904.208557] ? worker_thread+0x15d/0x1070 [ 1904.212714] ? _raw_spin_unlock_irq+0x24/0x80 [ 1904.217218] worker_thread+0x5d1/0x1070 [ 1904.221207] ? process_one_work+0x1540/0x1540 [ 1904.225710] kthread+0x30d/0x420 [ 1904.229087] ? kthread_create_on_node+0xd0/0xd0 [ 1904.233764] ret_from_fork+0x24/0x30 [ 1904.237549] Code: 03 0f 8e 5d 03 00 00 83 7b 20 04 75 b6 e8 f3 18 22 fb 48 8d 43 10 48 89 c2 48 89 04 24 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 16 04 00 00 48 b8 00 00 00 00 00 fc ff df 4c [ 1904.256756] RIP: hsr_netdev_notify+0x456/0x8c0 RSP: ffff8880a9a2f788 [ 1904.264863] ---[ end trace bf60ba425da510ea ]--- [ 1904.269626] Kernel panic - not syncing: Fatal exception [ 1904.276679] Kernel Offset: disabled [ 1904.280548] Rebooting in 86400 seconds..