) write$tun(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="000000914ef94cae502a55ffffffffff810000001205000000"], 0x19) write$binfmt_misc(r5, &(0x7f0000000140)=ANY=[], 0x1000000c8) ioctl$USBDEVFS_RELEASEINTERFACE(r5, 0x80045510, &(0x7f0000000080)=0x80000000) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f6465762f6e669bccf1bf643000"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') [ 430.337005][T16285] UDF-fs: error (device nbd1): udf_read_tagged: read failed, block=512, location=512 [ 430.363241][T16285] UDF-fs: warning (device nbd1): udf_load_vrs: No anchor found [ 430.391826][T16285] UDF-fs: Scanning with blocksize 2048 failed [ 430.422637][T16285] UDF-fs: error (device nbd1): udf_read_tagged: read failed, block=256, location=256 [ 430.443425][T16302] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 430.466672][T16285] UDF-fs: error (device nbd1): udf_read_tagged: read failed, block=512, location=512 [ 430.507262][T16285] UDF-fs: warning (device nbd1): udf_load_vrs: No anchor found [ 430.539679][T16285] UDF-fs: Scanning with blocksize 4096 failed [ 430.551711][T16310] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 430.565869][T16285] UDF-fs: warning (device nbd1): udf_fill_super: No partition found (1) 23:06:43 executing program 1: 23:06:43 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) r0 = accept(0xffffffffffffffff, &(0x7f0000000080)=@l2={0x1f, 0x0, @fixed}, &(0x7f0000000000)=0x80) sendmsg(r0, &(0x7f0000000200)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000180)="6a30cd368072378e90b99492972f5667dc08280b826458aa466fd3d26023cab0a48e977b8484a5fe6f9bf1bacb4afb89d735493e57cfe1ad1796d399ba08798b37849a5e2e7de4d27e2f57f195b6719dec478d06e40be4cc69dc7040377f3a8e1772c2b2ee7542be7df5a5dfea74", 0x6e}, {&(0x7f0000000380)="589415f12eed3d903204677daa12604f73158b34050e1b49331b48851be3c7c2f2633083dac2d0aed4a1f19e07a3430b4e91555447000933bd08dc8d20a714f021d748", 0x43}, {&(0x7f0000000400)="ca696c0e98804acf4f32150024eb790648ed3e785a52c6c99f3f793672b1ba7b1db0ef26c89c2de4a4536ec8355de4c00be9897118271b9318f3ecf9efa1de7d958f4a7074d1e8f5e11c675d50047c7e113b095783da688c73fd63e1503153b3cd51682e23df49d0d81384582df49c387cc95e6be19f0c53db7e2fe1d392e891f93c512d4a012118927feacf5cbec25d6dfe13c2a5a0deacc421f277c4d9d095f7d0a82fc1bb534242dfa767b1086bc262e428954aba3d1ffb44f24ca809751a2d0a3608d653ed907c0a87a07d1eac727de96166b28098e31942b561d0e6", 0xde}, {&(0x7f0000000500)="d570bd50e5bed3cac7156db59d8616663716f44a212a53b66cb88472d6c839a1fe390d596141ab715c2463361ddff3a1a8f5a92787c38073eb6257ac7fd4771de1fe5fa8f2a01d42955c8ca69061aa6ebdaa78deba069d052d52983c9bc8b8506f972e8d751b9b2be524441e43bc8a43fb0e161d2d8eb0a9b38b", 0x7a}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000001580)="870c9eac9498979d58ba6442069b0ff9f93271290f6bb15c5e76b6a2918f91cb08f9cb43d152784116c913a2f3f1d9d5de0b3bb0f926d65dc637824144d23f6875610596fc92179ee14b8503b7d41007b0478a6f11c127d9bde022a5be0842ebb5ed19efa5d63b176c695eeb7ad252028ea3d2c9af46eade61ec5479f34230358f1dd8d793ace34c6d", 0x89}], 0x6, &(0x7f00000016c0)=[{0x1010, 0x3a, 0x6, "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"}, {0xf8, 0x115, 0x3f, "6d4e9940e11f2ffb02172344469543e4845d376c3817dafa24bdf6c01112ef741fcecb82f5d53938238997389e48d57aac76f29f07eb49a84f058781ac7709389d2249f9cc1ee1d25c0917e1959724b2dbc4d5434335808dcb1671a662de7201cd6a13573f5cbd95ddd4693e98d76a01dbe2c69f9d7af519642a64b0c58209a9e81ba95f4b47f7c2efba6572fc0ec28c17aef0d119b3de680ce87fa3ba4251d69aa240c018c2d7d7af4efbaf4a62f243348753ec66645b4ced68a9652512134d37ef53b63992270d440c4440e205e388b171996f4ecb311696c735c332a973e8a7"}], 0x1108}, 0x801) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) 23:06:43 executing program 1: [ 430.745696][T16313] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 430.789756][T16313] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:43 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/h\x05oc/self/net/pfkey\x00') ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_UIE_ON(r1, 0x7003) 23:06:43 executing program 1: 23:06:43 executing program 3: syz_genetlink_get_family_id$wireguard(&(0x7f0000000000)='wireguard\x00') mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) [ 430.943449][T16321] UDF-fs: bad mount option "/hoc/self/net/pfkey" or missing value 23:06:43 executing program 1: [ 431.016797][T16321] UDF-fs: bad mount option "/hoc/self/net/pfkey" or missing value [ 431.025139][T16326] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:43 executing program 1: [ 431.070980][T16330] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:43 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvme-fabrics\x00', 0x6000, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000000)) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000180)={0x7, 0x15, 0x1}, 0x7) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x10005, 0x0) r4 = socket$inet_mptcp(0x2, 0x1, 0x106) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f00000000c0)='\x00', 0x0, r4) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r5, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000bbbbbbbbbbbbffffffffffff810000000805000000cf4ca8ad8e6c517d151c375c5e08985c7b3546b1847718422297fe45e9201b8eb9897461be5d27707c87985824ceb5229ea40f5702b61aa080e03176cbfa351807fa506d07155e8ffec63605cc3ff91115f7121fbad53b6e1821e5edd977676e9b73453524bfb0f36f40854fa1c4473f35350ea25cb598f77c3e98f5f2690f73639995978e709191b655560ea4fe0dc1ec85f503a672ece455fc39d13377bf53cd14aa9aed0b66cd2163410c16c626cb9b0ee89b499d9af0f7d3fe5a0c544ffaa22bb05be0d4ba05404d140308665795b1d8d6afe72dbffffebfa86572"], 0x19) write$binfmt_misc(r5, &(0x7f0000000140)=ANY=[], 0x1000000c8) ioctl$CAPI_GET_PROFILE(r5, 0xc0404309, &(0x7f0000000100)=0x3) 23:06:43 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="b063db050000006465762f5662b01bc593250980a0c54852f4ed320e5e92c3da4d312690329902393bf5d0fadcef06f361ff2388b8c5fc94473ba0520c27a9203089a826be4b2e2b5a95d86d957df02cd2a23ba23992fa0ca8d364c13b232a9136a60eaa086972b813ea6e77da52307d39a85f5828d851fea2df6103f8e291eb0ec29c8c"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) 23:06:43 executing program 1: 23:06:43 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000000)) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f640600000000000000"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:06:44 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) close(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000001c0)=0xe8) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r2, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r2, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r4, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r4, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r6, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r6, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r8, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) getgroups(0x6, &(0x7f0000000200)=[r2, r4, 0xee01, 0xffffffffffffffff, r6, r8]) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x2000080, &(0x7f0000000380)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id', 0x3d, r9}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}], [{@context={'context', 0x3d, 'unconfined_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/nbd'}}, {@measure='measure'}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}}) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') munlockall() [ 431.434462][T16334] fuse: Bad value for 'fd' [ 431.458938][T16334] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:44 executing program 1: [ 431.515379][T16334] fuse: Bad value for 'fd' [ 431.531350][T16344] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 431.555214][T16345] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:44 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x8080000000000, 0x7, &(0x7f00000007c0)=[{&(0x7f00000000c0)="93ffd06d471550ea3b7ac65a826fba43acebb2810928627ef1e8246e09baef0666621658199f4ed976028b9854ab746cac701dda98a344354607b30b622d2c73328ff170a7a3101bc6e1837f96d8797a5f6fd1077bcbf4a534a155c0a33f98b3cbd0e12d548ae1d9ba15029051ba9ed548419c88c69f8cdc7092be44ed7756fc86a029c63076b780b7b8c430f00cdc8b41d87f251ea31a8a60bb466c377e89ea144d882f0011712afcb37d7ffa411a06e924c6e0c152c4e44be24ea2cb10a7289d0c912f11d82e1d5d313b2b2bfdbe364f007b3c21877caa8119f9343a264e0b1d746f38696a8112", 0xe8, 0xfffffffffffffff8}, {&(0x7f00000001c0)="5c3af64b30acd637", 0x8, 0x8000}, {&(0x7f0000000380)="759c0ba53e67d742ce8a03b0437df17115a19e44509fb2714897c4f402d8f5b284f6c4bf8f9f7616ac0459b566943dc6a79361bcd69f8ed20470302c81cbeec7eebde702a8ec2bd64a6f2d05076bb48d1198d05d5192a2ecab49f217cd32ad1d87a4637c1f6d99da5b422834d6d2c4b22d07f2afd87abeb67e2849fb05eae4128d30e71b2c3e2ae2f267c049cd1d1187fdd5800cee6fd038c7ee72ff6708af0e88d5b9997cd3a73cd650b97b932daab889a4e5f9b6d2c469b910e5362fff8bb17dff44560f3e7b", 0xc7, 0x1}, {&(0x7f0000000480)="287640b10aed7ec0699872bc43e8c7043b8b29aee2adeec3d73367b636d7a1244814a3cfa8a6e0988a7135f2325561f7dfb84d19301fe64e8c92e9dc5ee5bb1d9ab0e450f57a691eb1b1d06b7a5baf2010eb1a9d156cb7505b580389fdb6ebeff2abe94e63b3c4d9951a4219a40324e23401ddec7c087cb5bb36f5eb2a4a80f065837e378e04819f8ece8195af23f8f0ffb45e7fe0e6ae3ccd1cb306", 0x9c, 0x80000001}, {&(0x7f0000000540)="8cde9e5f81ffca4be224dd3826c9852091feb2f0c042167cf46f7297553067c88b6061843295fdc9ed75414fa0796e7d241c0a36b2bc46854b78e2681fe08f51848e2207499296f4f91447f97a9ab6f96fdb8f8dd96b4a629fd50448cd4e05c6e3e2ebae0daf7be4c8d02e22c99f07e181a4fe77225da2ac4fc55246140a4fcc86c879249279d4eeb5618b39969dd3d0ba170b953eefb4ec736f68e1037f2ddb82e4ca9a6ee18ca76e8de3baa741", 0xae, 0x6}, {&(0x7f0000000600)="ecfb96781ae56f106657be9ce862d2755137c32404f70c661a22b8cd35d7305959012433ea2c3e6ff8281c29dfb47aea18dd0f29fbe8b7db208addcd6c59e25c598446f3a1e9611556fcc3318560ae16b478facf3ac6c3648f94c83e2b54b50b86587fb27762a3dfb92b41f7318c84f4307242fdbf5e398513186a71778b38cfa1c302d1592ace61394accceb6bff7e1fbae5d527d2500f0c3430b71f227fc628bbacbcacbd8f926818c66d1ea99460b01b545688ab917d5fd3520f3220ccea0756fc4b2e5e1b6209f1f14d0f175373f10d0a114587461cee9c3e8495970b5fbe2334f", 0xe3, 0x80}, {&(0x7f0000000700)="8ddc744e4fd4ea1c72fa1a5e03c483eac05fbbd1653105d90bb559fa584c00e08e131fee9f2fe45d7c557199be4805ad60bf953a2b880f65494c0cb036c3c89966bf48664c8b57852bc9e58b89284803776b4663c677c3ca4696989b2c150546eb1e0ab2c7d4e0f514b1d47cb26b687b81e1b8b19fb22ee6be2d71acb2f2478c17c06ff7242a", 0x86, 0xfffffffffffffffd}], 0x4800, &(0x7f0000000880)={[{@noinode_cache='noinode_cache'}, {@flushoncommit='flushoncommit'}, {@check_int='check_int'}, {@fragment_metadata='fragment=metadata'}], [{@uid_lt={'uid<', 0xffffffffffffffff}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'nodev[mime_typevmnet0bsecurityselinuxprocwlan1'}}, {@context={'context', 0x3d, 'system_u'}}]}) 23:06:44 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f0000000000)='nsfs\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) 23:06:44 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) close(r0) socket$inet6_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0x12, &(0x7f0000000440)={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0xa, 0x0, 0x0, @local}}, 0x5c) 23:06:44 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0xc000, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0x4) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f6465762f6e6264300098c16f0ddb1b267b7d9aae3d0dbeb59285aea94e76d8f43d"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') [ 431.706810][T16351] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 431.785798][T16355] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 431.801358][T16351] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:44 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xc, 0x2018010, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={0x0, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={'nr', 0x0}, 0x6, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5, 0x7, [@bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @null, @null, @default]}) openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = geteuid() setreuid(r2, 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x40, &(0x7f00000000c0)={[], [{@euid_eq={'euid', 0x3d, r2}}]}) 23:06:44 executing program 1: sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) pipe(0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) setrlimit(0x7, &(0x7f0000000240)) getrandom(&(0x7f0000001280)=""/4096, 0x1000, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x0) [ 431.845801][T16367] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 431.958664][T16372] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 431.993967][T16372] overlayfs: unrecognized mount option "euid=00000000000000000000" or missing value [ 432.025908][T16372] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = syz_open_dev$usbfs(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x7fff, 0x20002) ioctl$USBDEVFS_CLEAR_HALT(r2, 0x80045515, &(0x7f0000000140)={0x2, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_G_MODULATOR(r1, 0xc0445636, &(0x7f0000000080)={0x38a, "c4f20305245390b9d4645f314557b01def4991b9bb0f76cb99f54005a7c46aeb", 0x100, 0x7, 0x2, 0x2, 0x3}) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e22, @multicast1}, 0x10) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="2f6465762f6e626430650d16de28509eff704100"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) 23:06:45 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) accept$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000000)=0x6e) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:06:45 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) syz_open_dev$tty1(0xc, 0x4, 0x3) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:06:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) sendmsg$NL80211_CMD_GET_MESH_CONFIG(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x20040044) 23:06:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="15830040edffffff00006b000000080017"], 0x3}}, 0x0) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x28, r1, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x1}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac05}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x10040000) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=@newlink={0x38, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN={0x10, 0x2, {0xffff100f}}]}]}]}, 0x38}}, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r1, 0x400, 0x70bd25, 0x25dfdbfe, {}, [@NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_MAX_RETRIES={0x5, 0x5, 0xe}, @NL80211_MESHCONF_HWMP_CONFIRMATION_INTERVAL={0x6, 0x19, 0x7}]}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x40}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$netlink(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x14, r7, 0xb03, 0x0, 0x0, {0x10}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000440)={0x10c, r7, 0x4, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x88, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa34}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xef}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_NET={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5d3c}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000001}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffa}]}, @TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7f}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x10001}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3e}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x2b}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}]}]}, 0x10c}, 0x1, 0x0, 0x0, 0x10}, 0x40081) [ 432.441410][T16388] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 432.458528][T16390] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:45 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x800, &(0x7f0000000340)='/proc/self/net/pfkey\x00') ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) [ 432.489773][T16395] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 432.507258][T16394] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 432.527880][T16398] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:45 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@sg0='/dev/sg0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:06:45 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="00310000bbbbbbbbbbbbffffffff16e7f300000008abe5bd51"], 0x19) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r1, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x2c, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000380)={0x8, 0x120, 0xfa00, {0x1, {0x200, 0x28, "9b848ae37b68ec8b3107262bd3ac36405b1f1cbb62bf22f48e8df08c493cf35de045ad1f4ea09f94b548c41af2baa32a4cafe32b18f367769e662486a21f4488f0c1623c6c33ca9f74c09379919b8ed09410a3dd3274db2f6b54960e98d0451257e28e47b77638a2bbd4c09def03b25df0ffa182370033a906a6440b7ece955eeed5f02590ab88ef73773f8a549fd04ce12cb800f7773d58063b5d9df604b49376d7870e9eeba3197ce263873ecbd85d8102b35387b63af7c62f9d1e7de60ea4f469ff0c36dab47622a7aefee75c63b7994bfec0f81e940396f3a30b84924e31326a8878ed5dfdac2b9e2819584ff1a435433ca946b9bd3eb6b3865f4068d800", 0x20, 0x34, 0x18, 0x7f, 0x8, 0x5, 0x1}, r2}}, 0x128) fcntl$setpipe(r0, 0x407, 0x2) pipe(&(0x7f00000000c0)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f0000000000)='debugfs\x00', 0x20040, &(0x7f0000000340)='/proc/self/net/pfkey\x00') [ 432.593030][T16399] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 432.685268][T16405] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:45 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000180)=@sg0='/dev/sg0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x1808080, &(0x7f00000000c0)='/proc/3elf/net/pfmD\xf1v\xa4J\x97\xbd\xd3\xcf~key\x00s\xec=\x88\xcc[\x82\x9bS]\xb5\x85B\xdb=\ax\xd7\x03\xb7\x84\xdc\xa7n-\xe7\x05\xb5\x9e Q\xadtWC\xfb\xf4\xa8\xb8,t\xa6\x19\xfc\x0eY\xc1\x88W@\xc9\x99\xa6\xc7\xf0\xb6G\xb7/\xb6ry\xa3`\xaa\x84g,\xc505\x87\xc0\x96t\x17\x8c\xa8\xb5qX\xbb7x\xfc\xb49\x8e\x9ab\x9eq\xb7\xa9\xbd\xd9S\tG\x92*$\xc0\x9b\x99%\xe9[e\x1b\xe8d\xcdn\xf8\x92<\xc3\x02g\xf4\xeao@\xca+BV\xd3.\xceBZM)\x00\xc4/\x8ew\"') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f00000001c0)) openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) 23:06:45 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000000)='/proc/self/net/pfkey\x00') ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) 23:06:45 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:06:45 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000180)={0x0, 0x0, 0x6}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f00000001c0)={r4}) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ceph\x00', 0x2020, &(0x7f0000000100)='/proc/self/net/pfkey\x00\xbe\xb6\x1e\x15\x90j\xbe\x828|\xa5\"\x1dXW(~R*\x9d\xfe\x84<\x82\xae\x8e\xb2\xcb\xd4\xbd\xb9\x1e\xe1\xd5\x93\x14>\x19\xb7\xc2\xf21\xf4<\x99-\x82Wyhn\xae\xcd\n\x8e\xdd^)\x800xffffffffffffffff}) write$tun(r0, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000440)={0x3f, {{0x2, 0x4e20, @multicast1}}}, 0x88) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) ioctl$KVM_S390_VCPU_FAULT(r0, 0x4008ae52, &(0x7f0000000100)=0x100000001) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7fff, 0x840) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x10005, 0x0) sendto$phonet(r3, &(0x7f0000000080)="2b41a6d721199eda606a214a81ded8d99450c4405e7e5dfce479b75fac61eb8e05a2f480eea9b06ad3418407fa2ffb79ea5a20e521afab13bf5e6e7210145f3eb8bc554f53a46b1ce7050103c720ef49a90ecd7030dfff0878c944767b8008e934fe1b02c93e1f6c1241f6fc1276861a2f0594192202ff21bb13972db959", 0x7e, 0x4, 0x0, 0x0) fsetxattr$security_evm(r4, &(0x7f0000000140)='security.evm\x00', &(0x7f0000000380)=@v1={0x2, "51024252395a958b77d07582a621576b"}, 0x11, 0x2) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) 23:06:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x0) 23:06:45 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2ffe5a9c2f070065762f6d643000"], &(0x7f0000000280)='./file0\x00', &(0x7f0000000000)='dax\x00', 0x2044000, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:06:45 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) mount(&(0x7f00000001c0)=ANY=[@ANYRESDEC=0x0, @ANYRESDEC, @ANYBLOB="b473830422f0d35abc2ec3874a01f264", @ANYRESHEX=r0], &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x588000, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r5, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r5, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000480)={0xa0, 0x0, 0x2, {{0x0, 0x3, 0x9, 0x8, 0x3f, 0x2, {0x1, 0x5, 0x7f2, 0x1, 0xfffffffffffffc01, 0x7fffffff, 0x80, 0x4, 0xffffffe2, 0x6, 0x5, r3, r5, 0x32, 0x8}}, {0x0, 0x4}}}, 0xa0) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f0000000100)) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000040)=0x3) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r8 = socket$inet_udp(0x2, 0x2, 0x0) close(r8) splice(r7, 0x0, r8, 0x0, 0x10005, 0x0) setsockopt$bt_BT_RCVMTU(r7, 0x112, 0xd, &(0x7f0000000080)=0x1, 0x2) 23:06:46 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f6405be204bf09eee"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x100014, &(0x7f0000000340)='/proc/self/net/pfkey\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000000)=')\x00', 0x2) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) 23:06:46 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="0dc623beb0fedc293000"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') mkdir(&(0x7f0000000080)='./file1\x00', 0x1e7) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept4$inet(r1, 0x0, &(0x7f0000000000), 0x80000) rmdir(&(0x7f0000000300)='./file1\x00') r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000001c0)={'veth0_to_bond\x00', &(0x7f00000000c0)=@ethtool_drvinfo={0x3, "95f9e02be6466ac36a6edf602cc0e3f9d8ec7e510638f82c49b599bce4b95fd4", "94b44a4f7ad31e06b4b9f63958edaa4a999e2c069e7ce82894ee4ef9478dedaf", "6ec17f810aa9080789ec3f23ba6a2bde892535ccf58f28eb2f426669aa519ffa", "707c6357b57d967adb8542ea3a1359567dcde78ecc407d7fa1c5591e37e1c513", "790e17737cedc39119ab3ad2f0a5b24a6f1d91341835257225ce20416782fd76", "2e50a0c2c8032b7fc64e85c4", 0x7726, 0x3ff, 0x40, 0x9, 0xffff}}) r3 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000200)="3081a3", 0x1001, r3) keyctl$get_security(0x11, r3, &(0x7f0000000200)=""/51, 0x33) 23:06:46 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) r0 = geteuid() setreuid(r0, 0x0) getresgid(&(0x7f0000000080)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) chown(&(0x7f0000000000)='./file0\x00', r0, r1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file1\x00', &(0x7f0000000140)='pstore\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) 23:06:46 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000280)={@void, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x15) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000080)) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000000)='/proc/s\x9flf/net/pfjey\x00') 23:06:46 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454ca, 0x400000) ioctl$EVIOCGREP(r0, 0x80084503, 0x0) 23:06:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) fcntl$notify(r0, 0x402, 0x2) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="ff0700002f6e626401040000031fec91eb287b9bbc4500fc"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:06:46 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r3, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x1000000c8) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000180)=0x200, 0x4) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') r4 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xffffffffffffffa1, 0x404000) recvfrom$phonet(r4, &(0x7f0000000080)=""/215, 0xd7, 0x102, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) splice(r5, 0x0, r6, 0x0, 0x10005, 0x0) fcntl$setstatus(r5, 0x4, 0x46c00) [ 433.823763][T16478] UDF-fs: bad mount option "/proc/sŸlf/net/pfjey" or missing value 23:06:46 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') r0 = openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = fcntl$dupfd(r0, 0x406, r2) setsockopt$CAN_RAW_FD_FRAMES(r3, 0x65, 0x5, &(0x7f0000000000), 0x4) 23:06:46 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f64657e626430b8a79c238febe867c4fc0000"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'user.', '.trusted\x00'}, &(0x7f0000000100)=""/44, 0x2c) [ 433.971321][T16487] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 434.005440][T16487] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:46 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_S_PARM(r1, 0xc0cc5616, &(0x7f0000000380)={0x2, @output={0x0, 0x1, {0x400, 0x1}, 0x1000, 0x3ff}}) [ 434.038709][T16492] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:46 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r1, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req3={0x4, 0x100, 0x3, 0x74e3, 0x5, 0x2, 0x37}, 0x1c) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@sr0='/dev/sr0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') ioctl$RTC_UIE_OFF(r1, 0x7004) [ 434.112683][T16502] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 434.134686][T16502] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:47 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, 0x0, 0x0) 23:06:47 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000180)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x8}, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 23:06:47 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000080)=0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r2, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r2, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) chown(&(0x7f0000000000)='./file0\x00', r0, r2) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) 23:06:47 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='/de\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:06:47 executing program 1: r0 = memfd_create(&(0x7f0000000580)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\b\x00\x00\x00\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe9\xaa\x9b\xc3\x14\xd2\xd1y\x1f\x9e\x856\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce(\xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\xb8\xd9\xa3\xc4p\xf4\\>A\x11U\x99\x8d\xa3\x86\xb7\x1d\x87z\xd3\xc4\xdf\x13/\x97Yy\x8b{\x1df\x8d/\x90\xd3<\xf8\x18\xa4\x88\xcf\x048\xb4\xbe\xfa\xa5\xb7\xd6\xa5&);\x1br\xd2a\xf2\x8b\xa7\x15\xbe\x95\xeb\x1bB\xacoyP\xbb\x1c\xb9S-\xe0oK\xac\x00;S\x8a\x01\xd2\xca<\x04\xaf\x04\x9a\x9d\x84\xa5\x94J>F\xc5V\xc6\xfa\x8e\v\xe1\x82\x03`\xf8\xca\xf4\x89\r^Z44\x91\xeb\xf4$\xf3\x1d\xd5\xbd\xb6ZZ\xd8\xfdS\r\x98\x06/\x9a%m\xcf\xab u\xa6Fw\xde\xb4?\r\xbdK\xfb\xf2\x13\xb3\xfa\x00\xaaP\xc9t\x7f\'\xba\x12', 0x0) pwrite64(r0, &(0x7f00000006c0)="2fa30b86560ade30954a085347e87281ed4ae0ebdd914a1049ff6105b97279b6fadb832a266988bceb6ac8fcb39e95dbd07b8be37e37f84d341055626c12ef54aee412f1c018b40aea22f9eba145249c5677238d6d6838280b7bc743faffb9e309518268ee18ce94076cdbb6cce4e83c16bd358ec9817e85f7adfe3a612ee08ebc385cea25acac9475291f41ee8dbd6983843158c2fdeb51e6ea1f67255a194550f48f85c65bb8f729be810be8dfb45eb45fdbf9990666ca85857d7134d938c3125bb288b27374fdc03a9540f4caebe63aded8c71f89a5894d8f794afb2032e5318cf4af08acb507511ce583d4b833fb8ecc06f8e54cade80c8898ea1aab711b86", 0x12d, 0x0) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x4, 0x11, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000040)='./file0\x00') stat(&(0x7f0000000000)='./file0\x00', 0x0) [ 434.702436][T16516] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:47 executing program 2: capget(&(0x7f0000000100)={0x20071026}, &(0x7f0000000140)={0x3f, 0x0, 0x8, 0xffffffff, 0x9}) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:06:47 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000001700)=ANY=[@ANYBLOB="2f646d762f6e62643001602ff01bc83611fa273a34711e9335d10421041c226dfc04b95a28dbe0c586e4f7c99feb66bb1bccb087c8c3cc98f7297bba02e55f6f6a1d6fc1dd72f9e60803df09f5915f47fb42086713edba98eeb6f0570c1d2b28d0b784b1f155c5323894064a4da5ccf7865856cf84ce085ae0e00026953c8966ec02ea9bb25bf6986ead038c0d1e439f5c6da86f94cdf0e176fd76a65c8be6bd9464623e7f220646cb745657013dc4dc8584abd3869edc6c9de391e4b5cc3b148a13fff4b44c3a23dda581a67096de8c9fff1d9ed31f099f126a580073bd7668c0085ea3378c87c5e6a814169abb517da0049aa97dca30715c"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000840)={{0x0, r2, r3, 0x0, r3, 0x0, 0xb}, 0xb8fb, 0xffc, 0x3, 0x8000, 0x0, 0x0, 0x81}) shmctl$IPC_RMID(r1, 0x0) r4 = dup2(r0, r0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r5, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r5, &(0x7f0000000140)=ANY=[], 0x1000000c8) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000001540)={0x10001, 0x1, 0xd000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={&(0x7f0000000000)="07c6f37335197b80ad79e02553cf8f911c5c2335049b240a", &(0x7f0000000080)=""/162, &(0x7f0000000140)="fdeec4a282272c59c432a8618ccd17d5d318296b77a8439921ead11a4f4dfeee2b3706a0596d5d7a38fd58c9923125a55768ee2fadfe4445b4ffbb6cbad45208d8bff8e1549fc508df9ea74840c2d55de83d02533a01fdeea4d29552de28041a8cbee92b712f642a21b4bae84ee6cf8a97af79a00fa9eabd2a5a3c7e99a0c219393e14b400331fede50a1a3d04f102fc48a2fbbec7ef2c53fef55a662caf5fcb167fbd136a9781796898f698b92ccd4667cad5285425cc93309c4ab3ce4deaaf03796b41f65330ae35986c3a82ff6b", &(0x7f0000000380)="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", 0xfffffffd, r4, 0x4}, 0x38) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000001380)='/dev/zero\x00', 0x42480, 0x0) sysfs$2(0x2, 0x10000, &(0x7f0000001580)=""/78) name_to_handle_at(r6, &(0x7f00000013c0)='./file0\x00', &(0x7f0000001400)=ANY=[@ANYBLOB="f6000000fffbffffcdb426151517873eb6bd7727d280a95e9275628100e44dc1e3894027e40c2a60401e1517a59bfab4995080d94ef840d9bb7ede5cebc0db3f350c1285eaf8983ecf8ab36981fb75da06d27cc0a90d664fe98bf57fd8425597e41273e0acb4efe0b5040a6a6f2a2cc1a4195ca37c423082062fcc80dd5ef39831aa1e0fd49ace3c5e47972a9b1ff832f50ab6502127566a02388bf6b85a1b35caf5700b8ad011e174e1fda93628129a22fcf6ea87e36495788de65771c4d28d2a8d4bceb18b161955a7434cb482dac2efa3335d500217d62194f3d9e3ec23633cc561a5592a3cb4a7182b4022aed016f6a7d9336b36"], &(0x7f0000001500), 0x1000) [ 434.782121][T16516] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:47 executing program 4: mount(&(0x7f0000000240)=@md0='/dev/md0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0xc0884, &(0x7f0000000340)='/proc/self/net/pfkey\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) r2 = accept4(r0, 0x0, &(0x7f0000000080), 0x0) sendmsg$NFT_MSG_GETSETELEM(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)={0x3d38, 0xd, 0xa, 0x101, 0x0, 0x0, {0x7}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_LIST_ELEMENTS={0xc0, 0x3, 0x0, 0x1, [{0xbc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_USERDATA={0x9f, 0x6, 0x1, 0x0, "b7c83ef8aa8fcd902eb591f0c849ac87a9ac846dd8b3775096bd61a51eb19fa5786c7cf0c8a734ef3a70ec627b497bd96cf4d40205f48a74f7c6cd2e383ca2f116af2de10fae159b774b001a207af4ccdfc48ad16025ef56cbb54d2c07e44984a10266cbb5931fb14435711020a1d59ffc458ff5bf8abfae66d3233c7685d822d9259009a189fa9edf91742ea297bea496e737be53fb414f9b5d15"}, @NFTA_SET_ELEM_EXPR={0x4}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x3c2c, 0x3, 0x0, 0x1, [{0x30c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x308, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x34, 0x1, "e9dba6768dcde897f0575ed6e7e6080b69ad4587673eb49c01b199594727912d31f81b27dd269ec60059e26a61330337"}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x84, 0x1, "fc9ed9b4deda0145fe35c170ffbb1af40671b2873574ad9d8cb1ea374d6eacf4b02bcd63257cb52f294341c30e75758c331b9f04461c5bf7d6d7a496d9fb8f77b3177b22dbf9458fd39f78763062810c914da949dea6afc90f0633fb92cf549668ed55d9b4bcd5e8edf3862bd464cd90793b1eeedd6a80ed1f4ed9aca5bc393a"}, @NFTA_DATA_VALUE={0xa0, 0x1, "c9e313323cfac5d1a2433c4e5a2f58f0578e2fef00a139f0155386a5732469767015a3ee2f0906cf8fdc552a9cb11b3d83e69b64ac8957fbee99eda2fd70aafd634d84c9f0327277532da8a44cff236d5a4894d341a9f36d98efdeed98f38528f9f55e7f51b746624aa6266d60f8e54b9f591115482635376856f736cb6828a4be9b772ec411ff54edc11c7865595a04d290c945063e0b705c25badd"}, @NFTA_DATA_VALUE={0xd9, 0x1, "42e736bd8fa1b21d1938cca9e1eec7164a8796540bcb5b2c923e767106709380fc7c725c5f17f33a0681a8a9d86de90ed87f262122b5cf59bf099d40063f4ccd7aafacac670ebf1c3d9cdd9049a01f503269ccf220a966d28403af15b4ab98b82ac140f05cd39e49e86149d8ce76b7ea5d08ff1cbe4fa302692ca526e5a51c5e727873a1a39fbccae7a556b759da8790b6798e2c4e95c44e6715d803853e7afa6b738786aee7048f23e740dd011e2c06e5426d8619aa35a629e9f4e75c38d5c08152a679952870a9b75de319ba6f8c7855388b33a9"}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VALUE={0x7c, 0x1, "3d0989c2ce11bfa08296ffc2c2612d1c320e222514bfed85afa0a6bc0b39e04820d14cf3e56dd9a0099e1b09c154263eeaf56ba7994d8780098a1c32e499daa82398f0d8e0358683d9b3e84499f026dd3caad5ca7190d3b5b4dcd87e64e7f91a140370480b00020cffd04894742dda6795369aee2408f632"}]}]}, {0x2c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY={0x1c, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x16, 0x1, "7683cd946e2c64a6730571f73624b73d7e0b"}]}]}, {0x100c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_USERDATA={0x1004, 0x6, 0x1, 0x0, "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"}]}, {0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x100000000}]}, {0x90, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x7fff}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_USERDATA={0x38, 0x6, 0x1, 0x0, "d066b31c94c09d2956b98da44b7f34848374aa5c32d1e3372c0b219aae64d718806a5fb4efba4466bdc2798f36027916e38b8efc"}, @NFTA_SET_ELEM_USERDATA={0x34, 0x6, 0x1, 0x0, "00ab6af0e021e1f588a6794aa8bcb0eb230d499be7dc3c2020643df43106201c7e565d28745304f8fa01ec31f4197372"}]}, {0x164, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_DATA={0x14c, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xc4, 0x1, "727794b38abc61da7f1dab7f54c7220306298a2695afd4cc6c6577b324f662f294866bcc27eb81c500dc903d51f7e6e66c5c4fc6479095531bcad9ba056ff727253b036aeb211c9262da014b84012427916b75b729794245f677850b1e8b94da6d254c213647d081eb156043858fc85d9b72497926371d92fda717666ae9164f634fee65701bdadb6ce39338274425d8ef09bf164820ce8090cd5320f6075ff22fa9fffcb4b555c2f5a74094e43dc0a6af2fab4eea70d860f6b79993b7132a6d"}, @NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x9, 0x1, "e232e7081d"}]}]}, {0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_EXPR={0x4}]}, {0x1340, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_DATA={0x12d8, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x1004, 0x1, "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"}, @NFTA_DATA_VALUE={0x101, 0x1, "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"}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VALUE={0x70, 0x1, "e4aa498670f2f3b9fd723ce59ccc75af28616dd6a8eda50819a7012aec4660da39fb239187d8fbc147ab284d89e1f3f30bb7b29277c2df6b1b12eb56f39c3b62b151d1c5ce805b53a9252f9169360e6d6467108c87775b0f292215a03f4a71e0f3bb1b57731d4965a1171d38"}, @NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xdc1d09e1c1d868f}]}, @NFTA_DATA_VALUE={0xf6, 0x1, "01239caa834d772d2a5f6c77849765b82185b3b333ec5168c906af1f6b0d818ae7e0339b4dd4991881ce33cd3d1558155d028990ac67ca93557fb5aa8298ea7c70edb44e4df0c99fe5db1b7a647fee074ba5137ffb91360886474938a806c70bbc630d6c20e8fead408df1675fd0f76820fadda867574048732c6c3c2fd4d1719c48c011d01801d1ba4ad4330e53f0c7f1660b05e844c34a0228cfa268984bf47564450edeff9502c12d2dc13820af56c521f2ca9063e844861df8b1d536fdbd01282457f2babb1e62249d6c96c867c63be553d3141b59192c6a9fc7f3631fe854827ea263187535ff0bb75c3334c906896b"}]}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x2d2}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x101}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x5}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}]}, {0x1390, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_DATA={0x111c, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x1004, 0x1, "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"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VALUE={0xd1, 0x1, "099173d71ec02a2ccd1ce5975b70925464422eb65942b76b2c03ef5394fbd0f4389c4c7ad47898bd4c9f348ba38dabdce140f4e89490c0ce1180a17d1c46222725715daa7d0a67fa2a96758ead4dd4cfdf16fd69052d2dc8ccc66852e36afc5a43b3f0e4f7eba39b7c71bf080a2af4447cfeb6ee4edf8d6560f014db022c8e6a6a7daa814099560b547754b232e835d5f8f02a82cc567e23ef86b65affea01eb7b0e0e70e09fdfded3951c6863cf079eb0ef4697baa4e2429d1c0af922ad91581298c41a5d6ece8f1347316781"}, @NFTA_DATA_VALUE={0x22, 0x1, "5ad771c32e40b35b7aa786a91db7651b6cc29d524cfdf735687e22502578"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x1f}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_KEY={0x168, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x18, 0x1, "4d6d785ad5e7f861ce064a54c339c17fee8dbdb8"}, @NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0xab, 0x1, "067064097fb4c2c5e9aad9f0daa47c591e5d456125b39aad6b7d1112e47ac4b9ebbbd982348822e933bb5b0c14f63d66346550880ac275a1daa412f454e53219ee7b767b8b201a23af63ef90998d48f832ce68fcf114db38f09a73279d785f0fce8a2354ce500869823da559a01f8df41fe5ebe509344c9945dbb0c3a90fb054c92b27546bbd8c13ab951b236d00f6c2bd147b40ba6a5541657cdd2f6acacbddff5cc1651cc6dd"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VERDICT={0x58, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}]}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_USERDATA={0xcf, 0x6, 0x1, 0x0, "8ad0bd787e923a82cb575d82f8b105d1497604f4a1d1b707fff099336b549ce5f0bddb0f6d7e047c5a857f353085adb3890568f0f416b59f56e1cf8da78515b343998ff992c1ae483f940d0e6d9b0088738fa85c164ac6e3bb4fed047855cb412bd536dc06bfcaaa4c1d72229c4443bb0a66dfeef60ffe78c898fbcaffa236741145dd062a81f928f79055175bbdc40b4a3911c6ae29f03f4d3290ffaa85e8edba63b5b7c14f1db1597d3e287dab94aab1b012422ed5b63ca4a0f6050dda308960a12344f3343a38bddef3"}]}]}]}, 0x3d38}, 0x1, 0x0, 0x0, 0x20000011}, 0x4) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000000)=0x3) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) 23:06:47 executing program 1: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x1) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "54846a7b80c7ec0c4ba43496ea6cbd51"}, 0xc2349bd567f9a4e8, 0x0) [ 434.931316][T16527] capability: warning: `syz-executor.2' uses deprecated v2 capabilities in a way that may be insecure [ 435.009839][T16527] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:47 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r1, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x78, 0x2, 0x8, 0x401, 0x0, 0x0, {0x5, 0x0, 0x9}, [@CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_OPEN={0x8, 0x4, 0x1, 0x0, 0x8001}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x1}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_RESPOND={0x8}, @CTA_TIMEOUT_DCCP_CLOSING={0x8, 0x6, 0x1, 0x0, 0x3}, @CTA_TIMEOUT_DCCP_OPEN={0x8, 0x4, 0x1, 0x0, 0x236}, @CTA_TIMEOUT_DCCP_PARTOPEN={0x8, 0x3, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_DCCP_OPEN={0x8, 0x4, 0x1, 0x0, 0x80}]}, @CTA_TIMEOUT_DATA={0x1c, 0x4, 0x0, 0x1, @icmp=[@CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x20}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x5d5}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1ff}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r2 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r3, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x1000000c8) lsetxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='trusted.overlay.upper\x00', &(0x7f0000000440)={0x0, 0xfb, 0x107, 0x0, 0x6, "232f3764b8cac57d4fe229e380405be0", "5f4a4469f105543026d46dd81db801a044bef93aba07d3bf7fa0a69958ab5be7d7c6764b70b914511cbcd441c4a5add477123b494461bcc977563119fd3fdcf93c541973f4751e6c9267a312f2d3ecd858c57661340de00a72c0816b79a9a87776090364f46048076ea152e5243e4daf14129585a77f78d267b19db546264a86543d12597105bc7523e952e3bdf64f8a7c1fe796569b7b94c71407000000b158fb23b25fbe49b0eb8c728ad084ce0b877ab285dfdf474a7e2edab2a5f5aef64d5674836f175c0a132cb4813dccca6bc09e5a7fa1638f59cb4d9ab2d5c3f81b3feda1da3898e83228275c6350be6f2230e72c"}, 0x107, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r3, &(0x7f0000000080)="6a5ce832d371f81f32ebbdbca1634da7f56cc2f4676416e381908a239192231cae8ce96b1d5608c040b8bbdbeedaa15af49a12b0284853d848e0b76617a727d033b45e10427d704f2e532d192710ac787313dd852fa4c159cf6254e9b50201bf0252fc545cb9548ee7718f77fae757603f004f99290846ccff146f8a642935ee56891db034a5c55277dfba10ee2f375693a636bc27eba04e9a25", &(0x7f0000000000)=""/56, 0x4}, 0x20) [ 435.053138][T16530] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:47 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0xc000, 0x0) mount(&(0x7f0000000240)=@md0='/dev/md0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, &(0x7f0000000080)='/\x8aroc/Self4nev/pfkey\x00\xaf\xc9K\x89\x9d.\xf5s\x81\b\xaa\xb7\xfd\x82\xca\xf5\xf0\x1d\xc6\xfbL#\xeb\xaf\xfd[\x8e\xa7\xfco\x96\x19Nv\x1b') ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) 23:06:47 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) r2 = openat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r2, r1}, 0x14) [ 435.163246][T16536] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 435.270466][T16541] rpc_pipefs: Unknown parameter '/Šroc/Self4nev/pfkey' [ 435.311271][T16541] rpc_pipefs: Unknown parameter '/Šroc/Self4nev/pfkey' 23:06:48 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x3000000) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) 23:06:48 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 435.531287][T16551] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 435.567202][T16553] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:48 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) 23:06:48 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000000)={0x20000000, 0x1000, 0x3}) openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) 23:06:48 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 435.874685][T16561] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 435.931556][T16561] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:48 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x12) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x208800) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000080)={0x0, 0x80000, r2}) 23:06:48 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) close(r0) dup(r0) fcntl$setstatus(r0, 0x4, 0x2c00) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_gettime(r2, &(0x7f0000000100)) fcntl$setown(r0, 0x8, r1) capget(&(0x7f0000000000)={0x19980330, r1}, &(0x7f00000000c0)={0x0, 0x1000, 0x7fffffff, 0x480000, 0x1, 0x5}) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="d0348299e9407225cfc54c5a885d5165762f6e62018000"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:06:48 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="850000006d00000025000000000000009500000000000000afcd48d6494d614d1612ba392176dd2963228e1d69ba7ea94c500dc4ef2fad96ed406f21caf593836d9ea2cfb0e60436e054258c4686b066707de94a4f4d5fc79c987d669f2b1faca0f9d9924be41a9169bdfaf16d1c0b153911b8dd7f165789c691de6eee84309e7a23c19a39484809539fca4e0b6ec015a7d55545a34effa077faa55c59e88254f54077f799bf1683537a8ea0244d35b213bda80cc172afd80e361bedd8b8cc57255a5e3d77ac463920e231b7ae0da8616d2b7958f9005d822175ed60ab386d94af98af1da2b59525f8fe3b28d7e53c78fbfe5ab0255f347160ec8343e1494d3a63e57a15cf10453f6c0bb13b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0010f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f132a902e5111f2cc5e46ac1c60a9b10c074bfbcd4b09012175484135f0e519f0b1c4aaa026d570ecb5e8cddbed65ff76ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef479570c8ad943e392957b4f979ea17117a13201bafe4f0f6ea5a6c957ada0c548552b571bed5647223e78a99625bbca4fd91bc404ec13eaa66580ae7b813071cbb17d9f37282462f03de147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb5567e54d3504723177d356c4604b7a492ecec37e83efceefd7ca253cbc8edc8be05cc85451c6a14507434eb54b6f43caea5c4bf690441974b155f5adc6825a3a3d5b754df23175e2ce8b03bf3e3c033e54e4ba9b05292bfdb26f4cd7e166cc384b2845c537b397aaea0eac888419583ccaba598e6d8024920428e070ff941dd7067cb53879c3dbfa852e8fa7aa3d926c6d8aa1f82c76bc59352e82be8e52dce88f66bdb061681fc3b393f75eb23d5c6b4c0ac8ef660a37342f1d9a5d5c14b6b7e8611e5d311a20213ed6ac7b8d66fcc4b7454316338d928b8fff2739e811784d6873207c10ac73e264a6e65bf33020fc466df9ed2764ee2d076e5b68fa1642ebf17caf01bce8e02c31a13ceb7fed854b0625741964fdb2737505f8f584e4c14bd36b9e0608843fc32c6642091765068554ac92b42e467f69b499ecef34d2e6195365822b5577b3dd5f5c3424e7b6faea95c0109873eb52fb8e5a604c8adbf404a4dd79ce8c29f968f56dd583c3e9875678ca16f6b579cde0c1a0ab95f99620e84c0487e6565c04de458761768de308ff95a7189a7731378f0b171f99240f8167693329744d0e41639dca4859753d3"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 436.176045][T16568] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 436.222461][T16571] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 436.265593][T16572] capability: warning: `syz-executor.5' uses 32-bit capabilities (legacy support in use) 23:06:49 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="06ffff99fffbffffb5def5f60a3a1613136d8a9cbd6fb86a20ecbf0bc48afb0774cb1c5483f1bd0d5aea39539f2f7351a902b5f456ee9a4c78c96554096ee74411b1cd49228e9313ce064e5681ea98807f8033b6e1f8c7e0b348c1fa30d9e7dbef9e533f29f5dc2327b715d0b2f806ac56f580abbdea6a"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x81, 0x4, &(0x7f0000000580)=[{&(0x7f0000000180)="7f5ea82b9086069358fc1d6282bd79eba69f43e85f76e33c0d911925aa3861e196ebfca355b62305775fa39c8d37d5ea65cf6552d10cb1501e3e3b23f9bad517b367f575055505a9eab1f0929349f9b164d108ee748850020b07b1c12f0fbe1a1c0e59b90813b83960c6e1f1e40669bed23ab931e183f28f112036ee8ed63564d367777a8f38a83d4f9ce3ff2a6e0e1ad4d701b9a4bb50a6e7c4c8f5220be119b9d3e72dcede386fedfa49fe71daef811e0022bb0d52df1bff6ade7352a9b254ddcb2aa7e1a28fe2e21c51acaa5425565ff020c15daa2fc51421f1657f", 0xdd, 0x100000000}, {&(0x7f0000000380)="79e9c2c2cf9cfc13fa9b864131049d5f53e198948c4bf900449dc8ed10f3d84e66f311c53f250ff7749f899b27947bb2c1053b58e47ce59c92af9434331b01b628495cfa388e4b05ce1b859f45c54312c20b0335ded3910291e5e64fafebde307025ca23f030e61f6ddef57524eee6caab698b", 0x73, 0x400}, {&(0x7f0000000400)="b410c86a78a0ec35cf18a7f76dc0359ac4302e3b8eaf1ee5c29712a4c6437760ccd65005509bc027b036901e508c53d1718c64705448e303d8b4ea7c46b4a1a353775fe5c30684b6a52a95f7a787ba32e5007ce6c6be0ef2693dadb8612931be80d97e9d2e19a25675ed6e5b003649", 0x6f, 0x2}, {&(0x7f0000000480)="6c7fd9c065157512166ab5aabc651ffae269a4e3238d944d7402b18a81d71c7c9eb719bd36498cc400da4a9febe17004aee2b71ade0dce4aeb1f6ffb8c59cde726c89f2700fe96c7dfb39103b8a26ad6d5ed50eb283b91135a521f9d0d756fbcf836431e7043ccafcfce6140f691c8b894b4f636de01d900a8814a910930841d6f8b43e0322dfced3c9ea1b575ed5d0465a9e22bb47d0ed1cdf3571387aba78532065b7a5009d803ac323d19e75141060fc18250cfe88e2b13ddb29de302556fd9fb4baaf1663504f4494677e26a193ffad3966cfee32eaa86aa91c700b0e8ce0d3677d5395312c49613ecee13351f2784efe34d4417773363ebf061", 0xfc, 0x4}], 0x11a824, 0x0) r0 = openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) sched_setaffinity(0x0, 0x8, &(0x7f0000000300)=0x6) write$tun(r2, &(0x7f0000000600)={@void, @void, @eth={@multicast, @broadcast, @val={@void}, {@canfd={0xd, {{0x1, 0x1}, 0x10, 0x1, 0x0, 0x0, "811ec6bf31c74cd0cce984a8cf8611ffeee9bf31dbc5ba0435058b5e4a195bf3caa0e625ffab6d800a7789efcdc56211abd23cc9493c3f597c61e50587a4b562"}}}}}, 0x5a) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) getpeername$unix(r1, &(0x7f0000000680), &(0x7f00000000c0)=0xfffffffffffffc6a) sync_file_range(r0, 0x3, 0x200, 0x4) 23:06:49 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x1, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=@newlink={0x38, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN={0x10, 0x2, {0xffff100f}}]}]}]}, 0x38}}, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=@newlink={0x38, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN={0x10, 0x2, {0xffff100f}}]}]}]}, 0x38}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x11, 0x2, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=@newlink={0x38, 0x10, 0x801, 0x70bd2c, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN={0x10, 0x2, {0xffff100f}}]}]}]}, 0x38}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x11, 0x2, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=@newlink={0x38, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN={0x10, 0x2, {0xffff100f}}]}]}]}, 0x38}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000380)={0x368, 0x0, 0x800, 0x70bd27, 0x25dfdbfd, {}, [{{0x8}, {0xfc, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x7f}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x800}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8}, {0x1b8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x7afc}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x81}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8, 0x1, r5}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0xffffffff}}, {0x8}}}]}}, {{0x8, 0x1, r8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x81}}}]}}]}, 0x368}, 0x1, 0x0, 0x0, 0x20000804}, 0x4000000) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) 23:06:49 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 436.561775][T16585] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 436.777787][T16585] UDF-fs: bad mount option "€" or missing value 23:06:49 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="850000006d00000025000000000000009500000000000000afcd48d6494d614d1612ba392176dd2963228e1d69ba7ea94c500dc4ef2fad96ed406f21caf593836d9ea2cfb0e60436e054258c4686b066707de94a4f4d5fc79c987d669f2b1faca0f9d9924be41a9169bdfaf16d1c0b153911b8dd7f165789c691de6eee84309e7a23c19a39484809539fca4e0b6ec015a7d55545a34effa077faa55c59e88254f54077f799bf1683537a8ea0244d35b213bda80cc172afd80e361bedd8b8cc57255a5e3d77ac463920e231b7ae0da8616d2b7958f9005d822175ed60ab386d94af98af1da2b59525f8fe3b28d7e53c78fbfe5ab0255f347160ec8343e1494d3a63e57a15cf10453f6c0bb13b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0010f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f132a902e5111f2cc5e46ac1c60a9b10c074bfbcd4b09012175484135f0e519f0b1c4aaa026d570ecb5e8cddbed65ff76ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef479570c8ad943e392957b4f979ea17117a13201bafe4f0f6ea5a6c957ada0c548552b571bed5647223e78a99625bbca4fd91bc404ec13eaa66580ae7b813071cbb17d9f37282462f03de147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb5567e54d3504723177d356c4604b7a492ecec37e83efceefd7ca253cbc8edc8be05cc85451c6a14507434eb54b6f43caea5c4bf690441974b155f5adc6825a3a3d5b754df23175e2ce8b03bf3e3c033e54e4ba9b05292bfdb26f4cd7e166cc384b2845c537b397aaea0eac888419583ccaba598e6d8024920428e070ff941dd7067cb53879c3dbfa852e8fa7aa3d926c6d8aa1f82c76bc59352e82be8e52dce88f66bdb061681fc3b393f75eb23d5c6b4c0ac8ef660a37342f1d9a5d5c14b6b7e8611e5d311a20213ed6ac7b8d66fcc4b7454316338d928b8fff2739e811784d6873207c10ac73e264a6e65bf33020fc466df9ed2764ee2d076e5b68fa1642ebf17caf01bce8e02c31a13ceb7fed854b0625741964fdb2737505f8f584e4c14bd36b9e0608843fc32c6642091765068554ac92b42e467f69b499ecef34d2e6195365822b5577b3dd5f5c3424e7b6faea95c0109873eb52fb8e5a604c8adbf404a4dd79ce8c29f968f56dd583c3e9875678ca16f6b579cde0c1a0ab95f99620e84c0487e6565c04de458761768de308ff95a7189a7731378f0b171f99240f8167693329744d0e41639dca4859753d3"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) 23:06:49 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) 23:06:49 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) [ 437.136931][T16598] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:49 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="850000006d00000025000000000000009500000000000000afcd48d6494d614d1612ba392176dd2963228e1d69ba7ea94c500dc4ef2fad96ed406f21caf593836d9ea2cfb0e60436e054258c4686b066707de94a4f4d5fc79c987d669f2b1faca0f9d9924be41a9169bdfaf16d1c0b153911b8dd7f165789c691de6eee84309e7a23c19a39484809539fca4e0b6ec015a7d55545a34effa077faa55c59e88254f54077f799bf1683537a8ea0244d35b213bda80cc172afd80e361bedd8b8cc57255a5e3d77ac463920e231b7ae0da8616d2b7958f9005d822175ed60ab386d94af98af1da2b59525f8fe3b28d7e53c78fbfe5ab0255f347160ec8343e1494d3a63e57a15cf10453f6c0bb13b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0010f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f132a902e5111f2cc5e46ac1c60a9b10c074bfbcd4b09012175484135f0e519f0b1c4aaa026d570ecb5e8cddbed65ff76ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef479570c8ad943e392957b4f979ea17117a13201bafe4f0f6ea5a6c957ada0c548552b571bed5647223e78a99625bbca4fd91bc404ec13eaa66580ae7b813071cbb17d9f37282462f03de147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb5567e54d3504723177d356c4604b7a492ecec37e83efceefd7ca253cbc8edc8be05cc85451c6a14507434eb54b6f43caea5c4bf690441974b155f5adc6825a3a3d5b754df23175e2ce8b03bf3e3c033e54e4ba9b05292bfdb26f4cd7e166cc384b2845c537b397aaea0eac888419583ccaba598e6d8024920428e070ff941dd7067cb53879c3dbfa852e8fa7aa3d926c6d8aa1f82c76bc59352e82be8e52dce88f66bdb061681fc3b393f75eb23d5c6b4c0ac8ef660a37342f1d9a5d5c14b6b7e8611e5d311a20213ed6ac7b8d66fcc4b7454316338d928b8fff2739e811784d6873207c10ac73e264a6e65bf33020fc466df9ed2764ee2d076e5b68fa1642ebf17caf01bce8e02c31a13ceb7fed854b0625741964fdb2737505f8f584e4c14bd36b9e0608843fc32c6642091765068554ac92b42e467f69b499ecef34d2e6195365822b5577b3dd5f5c3424e7b6faea95c0109873eb52fb8e5a604c8adbf404a4dd79ce8c29f968f56dd583c3e9875678ca16f6b579cde0c1a0ab95f99620e84c0487e6565c04de458761768de308ff95a7189a7731378f0b171f99240f8167693329744d0e41639dca4859753d3"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) [ 437.189545][T16598] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:49 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x100, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000000)={0x1, [0x0]}) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) 23:06:50 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f0000000000)='tracefs\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) 23:06:50 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:06:51 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r2, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) accept4$inet6(r0, &(0x7f00000000c0), &(0x7f0000000100)=0x1c, 0x800) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x1000000c8) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f0000000000)='.%eth1/\x00', &(0x7f0000000080)='./file0\x00', r2) 23:06:51 executing program 3: ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000000)=0x9) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='\x00d0\x00'], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0106401, &(0x7f0000000140)={0x83, &(0x7f0000000080)=""/131}) openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) 23:06:51 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000200)="3081a3", 0x1001, r0) keyctl$update(0x2, r0, 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f00000003c0)={0x3, 0x7}) write$tun(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="00e10000bbbbbbbbbbbbffffffffffff81000006459b73dfa3809063f145e755000805000000"], 0x19) getegid() write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) sendmsg$IPSET_CMD_LIST(r2, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {0x0, 0x0, 0x7}, [@IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x94}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x17, 0xd, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}, [@exit, @ldst={0x0, 0x1, 0x0, 0x978fdf1d623f14ff, 0xa, 0x1}, @call={0x85, 0x0, 0x0, 0xe}, @ldst={0x1, 0x3, 0x0, 0x9, 0xa, 0xffffffffffffffc0, 0x10}, @generic={0x3f, 0x5, 0x8, 0x2, 0xfff}, @alu={0x7, 0x0, 0xa, 0xa, 0x6, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000000000)='syzkaller\x00', 0xfffffff7, 0x3f, &(0x7f0000000100)=""/63, 0x41000, 0x1, [], 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0xf, 0xffffff62, 0xff}, 0x10, 0xffffffffffffffff, r1}, 0x78) pwrite64(r3, &(0x7f0000000300)="ed9dd75b93", 0x5, 0x0) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) 23:06:51 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:06:51 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r1, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) r2 = open_tree(r1, &(0x7f0000000000)='./file0/file0\x00', 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) close(r5) fcntl$setstatus(r5, 0x4, 0x2c00) r6 = gettid() fcntl$setown(r5, 0x8, r6) r7 = geteuid() setreuid(r7, 0x0) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r9, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r9, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005a00)=[{&(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000140)="363e93713df3e885483d1f6fb1e30be97507deebba29d0ebb6005588db326e6dbd6aa09c2a33142809bfa362b87a76bf861ad25d732d06f29bbb3e81b650ecc6b96eb0", 0x43}, {&(0x7f0000000380)="70d3fd4e66877adcae3de1b7a9bff65493dfc0e29af220b2ccd7ded07944e1691a342e7fc7cf085adbce2341a1c4f91175d13eb724102535e9faa9f9ef439d2e3ee715e452ef9d3f605dfae8b1ffb968d835e18d2f04daa2eb09c64c2af138915ce646f5c22398072cea0cc2d5b6e8dc46767903b334e6ca7fe9bf77329bec06220a41e16d8804e1e902a43f9e34519895998e5aadb7fb2a9ba3ca7c", 0x9c}, {&(0x7f0000000440)="48f695e148bf16ce80ab4f08e59593625a18b8a9d72d1716d8e21f344a4a20a93bc7fa0c47515e2d8343adfd60d497c9df494d7b70825b013b09ac1774e70e51e6876c723d949287bc26b8137c27a02db5b1e41ef1c993cccb206639386ff5366a67ee65354b807b6a70be63b201b8b6a1c12aca5d645d74334614366a40872a047fb58acecc5f844b08ab04da03244017a7bcc73fd10361fdf6d194a3ed18544f99bde68c68b5f7a7783a486be75e8dbe6d6f512491a76e53d44565345f0ea76c7f453bc061696d0a856532e5782639706d954dce50d510c3269ef915172489ad0f0d017b3fd1b9f251abbb6a04", 0xee}], 0x3, &(0x7f0000000200)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [r2, r2]}}], 0x38}, {&(0x7f0000000540)=@file={0x1, './file0/file0\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000005c0)="ed735d65799f27ed2e6917806fc6bf52198b37cc2405a69576bcec0a8a4ce2d931d2a28fc8ae60b3da1a31a0a16fd64a91f18de6448697c9ca618736d7b0d5ec532aaddd02ce6c468c1cf8301e6b", 0x4e}, {&(0x7f0000000640)="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", 0xff}, {&(0x7f0000000740)="80f2a2ea20163617e32545b28afb70222ad96dfb5b30d7dbefacc615416116bbd1cd212d485b8a532b8c0a8f5ffbdb5d3dd586347a0b8b0cb8aed414d7460c570208811cf3fa799f6fb66a6ae6b0cffe460b262a8478646b4af2612fb966e3b41aa9c0bb92cce1bfe07264fd97e75a12491f8498eee5fd1130f16e2d8ebff9286ffab6884d10df5b137ea6751d71616031a304227afb98fe32ebbd49e125b303413df33f26d85d8644ed854081ac6d8d2df35af2e648f016e08fa799", 0xbc}, {&(0x7f0000000800)="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", 0xff}, {&(0x7f0000000900)="40844dc0d80d67033135cf5a0cb90562125f576b539d4ec6e9454a9f1eb6a1e9d5786438db7d8055efeba50b05bd15cb442ff8f6a8675c6e6246bfc147d310728e4fc847ef05ee7ba4382c9fe17884bc5a10ca772f5c031251d4cc49f0af3e9572e9b336", 0x64}], 0x5, 0x0, 0x0, 0x4000000}, {&(0x7f0000000a00)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000f80)=[{&(0x7f0000000a80)="cdca7818634fc4d43f7c69221c21a6fa29e7552a92d28045cff468c95acec7be74dcfcbb94dede27d6cf028decabdae10844b9c11042fe62d9bb14cb85c34cbab3f521c32d8ea56685f56829feadd0ebe96e53bb604ccefdf63a91023ba759e4eefe3b1c626757d6bb39918f84288f0fe4fdbf20a35bf3699b6b1b31f86c563e13084d3b11dd5578b2b3fe4f485317e70dfae8d87332bde93e58725e", 0x9c}, {&(0x7f0000000b40)="352900189aad684baeb1cd6d5f62bc017fe845eef8f260d1dab06c1239cccabf09ff52bf8456d1542fab49f3a3c86b2ed50103cc8135113705e57d223de5b19f9b7fef5353ee618765c5121cf32d4e868fe39dcf", 0x54}, {&(0x7f0000000300)="84da305c464423656baf959fb25e9ae8fef2fc912a", 0x15}, {&(0x7f0000000bc0)="3c4b01bfd39205f781b68740d4de82b87cfc5f69ec618244bf63f230993c18a4388df494f68cd41e0c96ad80b49a5a01de182838c3bc33295fe0c8154ab31299c7f13e3323f6cb901ad05a2058bd4a4f36928daddba3bb3cde90e05ebe526a3d9b433ebf7203c472590294969a42fa4306fb5ba9b1d2472b4602b651ae7d67f64e7e3ea9ec80562438bed64c52b045d7ffafb494e1291c647049a72cbcd3aa527b4aef296e8578e4", 0xa8}, {&(0x7f0000000c80)="d76be51f7459f318dd64d187f0b14a94b1aa18ab57c41d967ed2d0f80fa394c8fdfa5f609d2f0a39428819410d1e9e0916b3f298f26ba5fd924eabbf41fed52caf5866924c052879b9153320cc9205302047eb502823807bdacfab55424f5b605fd7ea86f47c4cbd900e9cd9f5fc6f312b78007e643000b8ba79b7d9b2a1c2754404658609547723667eaac33363a272800a35ed4552072b68160b04f482e00f337f5079ce3695bcb64b87458f645a4cc44374dff04a6079e2d86d763c82ae854928192031fb10203b7b07e1a39a30d2972486eed5", 0xd5}, {&(0x7f0000000d80)="156ac214458e20bdca1c3341b3b001735f6c190ffc8abeb43e75505e15c3e91e07504175ea616783382ff77b033669492a45d1ecd0ba6f076666ef0eaf843e", 0x3f}, {&(0x7f0000000dc0)="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", 0xfd}, {&(0x7f0000000ec0)="0a4346d24e06a2a9603314aadfe7a2a94432737c109e632e4a99d280d48111651008e60d5da29977921bb12638", 0x2d}, {&(0x7f0000000f00)="375fbd479d8ab34f1fcafd3717bd159ca5e0c7dac4870e7f2d2f7c87e3cad23939f8453c3bf51c5b056b7a2dc9a1a60a57351f3e3af89fb3633c85bf03c0d8a35250ccaf04f8a14702511d", 0x4b}], 0x9, &(0x7f0000001480)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x148, 0x8050}, {&(0x7f0000001600)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000001bc0)=[{&(0x7f0000001680)="8ed686ba9b1b30df92a488862dd5336c38423eb887d447f5b1f7072c54cd4d783d9cf5d802ccda902b9aa9b45b263c6ccca4a40a340bc47b7ae4d14b47311e71a9d7b0df5a32cc2c53fef286942e06c8c04578b1549fca77882ef80ef2beea25ccb41a2f91b3b157c665f8f8a8f0052b934ebe861cc05906c9a8a0be6323e5a5b18990f52ae42173d4e38cb702ec7c465d8bccbccd7dc3da53a323d8f7ba2cde7d185633cf8fb0174cf1aefe19e80932da38cb28522e7a", 0xb7}, {&(0x7f0000001740)="8524ee694f4d1ae65d3c40dee4bf8ec43e4bf9e444fc172ed14e8b78bf580e0d99dff5cb32324863077fa82c118e5a1535c230854c376afbfe8f165790cec92d3bda1c249629260a91049131b3a527556c15da51c1931e3c05e568d6ceebc4aed97fe0d71424f39007c52ea03aab566445fc08d2b7f8be1085570fdc994347eb12434f5ffcc54a20835bdd8eeee212f89cc234f461582f54d6ee2ac2350f45e86589db", 0xa3}, {&(0x7f0000001800)="bc562cf4f2cba39e44a3463f360879096a53503d0df33ff5452ff810346f180985acdd3a5441b635f514c90f7dc87e9d1174ae2a693297e40425c7574f7f6afc81e01f73749c044e8dc1a22e6d1255af4d793ed7e0a6894f81e699f7d7219a178e2c58e019be9a30c806673c7b9dd3ad4b27f45daf05a5e85ba9f96066995443233559089383c471f7ba5407c245c12f44b527eb25b8d45e35d610593e2429bab529c526a479c4201685e276ded8b97a538771c56eb07b022c9ff940d42c71af67ea498a498a95783483382445f6627d5acc5ad34b6132f385e3e069d72d842900f1e58921a20d5fb06b5ef04600c81b", 0xf0}, {&(0x7f0000001240)="9f17710db4ab0900000000000000b50e72095ba1c7b3cd6e935f0eed1832fb0eb42afc744b2937f87b9c4a2a9fd188b47ddfeb16a8206deadb3ab02fb3fe6a5ed4879d29bd5730e4718525a9250d7d60af34eb11fd764bfd21bda407a1921a0c043984d3242163e6a65f5bfa1544c0", 0x6f}, {&(0x7f0000001940)="54964bd09a0c8480b6a55f2b530ae7846a90eee4543770dbe5ae2ab6114519bc3019c75f11409b3a2775c254095c365eeae2f7ac5c8556472b42fa9274123f148d7c85cf95ed5837226467a9d08b92fd4fb579df42e8dc4d2d654db375a072c563d969c5cb5f61438537db1c1f42d1787acce860fb4de3e0b1cff0f12786565d18141a934cc2ef243f479be9f67ad5cf2150e4d52941475703f2815218551e627bc39baad0e02d26d461b1c3b1a3526f0ac66aebf224182989dd3939d50209e3", 0xc0}, {&(0x7f0000001a00)="622def7729abe1614b03005cf08d09bba510ef2465ef24fe81fce1b270d68deb467a15dc29ee2524b8b2d0cb16340917f05b9d56efca2c349b7648d84666768d4d4f6a7333e1a93ac03d5402e517b9dc47d96dc47d3fc62bb63b2fa32bcb56a23233b333352606318693a034fbce29b6899406a2f4697b4bb07ecb9245a4d2488087dd654604826fee843fb6de5830c2c5069d6661a276b4a4b6c4cb87437fad8913b101e6d3d9428808b656a7bb77a3784294defe55f9e5068551d9b57d9f943faf7ab8df6192ef6366c38ba4", 0xcd}, {&(0x7f0000001b00)="49005e189e71b98673ca9d04245007eadcac4bdc5ee6304b626bd6ef4f2b812bd8266eb3db71fb550e73b7493bcab3bfcb518c785c4cbf3741cc58c77adb5edad42573b1a76e61094d71bcd5bb26641914e33518de1b19e9252575a5d2875c6f622452ce577d7597ea26634ccd43d40357c5870e0656b576bfe401dd517aeaaeb29246cdf18dad040e0c9f87f66bfa9a451e06f2ed7d31acb4d8de3d03db37b49378337b4ec8da28d19d04ade8a6a9a9011ef0b392231f", 0xb7}], 0x7, &(0x7f0000001cc0)=[@rights={{0x18, 0x1, 0x1, [r2, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r1]}}, @rights={{0x2c, 0x1, 0x1, [r0, r1, r0, r2, r1, r1, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0xa0, 0x40080}, {&(0x7f0000001d80)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000001f80)=[{&(0x7f0000001e00)="29e3011c29222bc875124eeae8178792013a4bc89a217fab38fcd45f87d04587631f9cc81602a90b53cc639ab7adc4d517822874cf31376b4dabd3ca8535c5766c5c19709795361d5a8a8ba456f3694a2a6013823b1dfb7c4ecefb6053920901586fe91229575194b219466a0f1b66c6ab2631d3ef3878fc0611c6cdec6be9f3a3db0f84ee8aac78a74a87deabf0f74643102d94c4bbfb3c4270a81158ca4d223adf4189ccfcf1a011105c55ebdcac", 0xaf}, {&(0x7f0000001ec0)="b5de6deb3945069e8265e6f4210d11bf9c6354d4bb985439c28cab4e0c7ed626b39258338656eee490a7d0c8e7cdf388e0330f50ef009be8dcc7f3b09040d0542fd6f786093b84bc266dbbdec96c3cea08448f5d725b20e9e1041533930ae4f1c9d5e9f660d86aae2ea40011d39c84b76b5b928dd1cdece1234431e7995fd6743d416961a51ad5f34e9c1adb28705d534e7b61e4e1cc7ca2c23e003d83d46ba53537e40a4609c04673a6f46f2a3f034012b39a9b517b6a2b93ab489c", 0xbc}], 0x2, &(0x7f0000002200)=[@cred={{0x1c}}], 0x20, 0x4084}, {&(0x7f0000002240)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000003740)=[{&(0x7f00000022c0)="f38b28dade3f3ef3f7a6ed522dd538c920b8c76fe3376f5bbb0da2fcfabc2767fa80228fecbce829ac6cb4d00cd358158d7806eb31c791c916a4968506cc923bc99de806c41289884da23a6eab5b992ddac7f7bb2326b0223b1c33330701d3224195c23a6218e97e35d9", 0x6a}, {&(0x7f0000002340)="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", 0x1000}, {&(0x7f0000003340)="bac6f6f0a76ab7de3bdcbc3d28caae693b19c1577b0384090acb09ef095531548f55f99ec1fd2a2632e9a8fcaabf9376f7273702ae49eb1413c119540878f34c8b9bdc493bad3fda2212f31a303d39d1795a48224a62c1d195ba0b11f56d94273b92b364c8fc417729ba07ca26ff9172895e40cc855470458f4f1e4a4c097c32c37991b186b8f2d76466b9ecd0ad18f6e07e857c459114ac", 0x98}, {&(0x7f0000003400)="3c63cb4cdeaeec383ae5e890537d0fcb7781a2c398147a7f9dc0724d673adeabe7d22ac98fee4be544d028d2b7c579925a2dbc97ee7a91df99dc9c40d21f9b56dfbe4b83c73e41ea067305998f96876ec93103a33a4d8706edfec04f7c6a59e5d91a71d83af2525eff1548f3cf7710a721762edd9fcf3aeb88e466f3d37ce5bdc83fd67cf39fbb51ad7bfe617d8e6f475490bad87bc3d94d216604110cd89d1c9f96e4eaaba9d8f8dbe45e8a7f72171555712ab5df4929748dfacb26c61d972e5bb7f14c0ff232", 0xc7}, {&(0x7f0000003500)="3f8ec187c47fad1575ebb52b61fddda7c70f5ff9c8769af16a1cc8934d754ec8bbc3f782838ac57653caf7baf08a51d71f706bc13e99a9d0c671e040dd4f5a4ba110d68a699fd9dc6064aa02467f1047ce99e52c2e15", 0x56}, {&(0x7f0000003580)="96084563a7a54c0ecbd2bedf443911cd35b73defb500d58325ef8f1c2fe910bece44621548a3282d5b3046bf8aa6cf1ca5d8b07228d89c99f3f2b24c7a95b1ef8d9fa91dfecfdfc83c1e8b101b6ad26a6fd11c9c8aa98369e6a318392feceb04f1", 0x61}, {&(0x7f0000003600)="dfda32f49212bd1e78272fd3e0dcd1028c0047c56ff24633db6e8645d4b67da7563a1fa48512bd1090a865e41f98025abceb4d851d4da6ddb802c01dc370a6401a1bf7b2a962a2dad45625665a8828b48953e7da49998c90b4880247c97a0b2400bedbd2ee4249a2c4205985e114efca4f2398b3cfd7b89bd7933d6aa05593973ac6fe16fa937db459cae70a98eb", 0x8e}, {&(0x7f00000036c0)}, {&(0x7f0000001100)="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", 0x127}], 0x9, &(0x7f0000001040)=ANY=[@ANYBLOB="1c0000000000c3e09383ab4602f56a2b4ee88100"/31, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x87, 0x4}, {&(0x7f0000003b00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003f00)=[{&(0x7f0000003b80)="d905d3ff74857f04ff0821a98c4cf4a79c1e066dcc1bce17b6ffff3502417f9ec66edaa25ce2f5bdc9f8a63010e65e5afc3269d704", 0x35}, {&(0x7f0000003bc0)}, {&(0x7f0000003c00)="9ceeb122bde5ca631f32a799346476866d0d6ff682491bf2e25eb5d7aeb529f84686c9c6ebf9edba8b8baa9fe0ecfdd074d9d106528d84b36887b2f245656580bbbf3777a1d67804f6315ba51e3372d9d95aa521a67c58fbbbb367f7eaaa6726b1efe8", 0x63}, {&(0x7f0000003c80)="a6e22d4ea09b4381a54f40c3e06750f9be300c05f5090b0747d63e2238fc365779f879deafabcdc3d67f922cfffbd9e9c3a5af73a2d4cd36745e4a38f900dd08cd327be3e673b26aa41b8b5d0cbe67914e5cf90c3440b126954301a53323d5ceb6864292fa5c6715a5aad06db9f69d1ad73899faba16158722f8d90a69d6379e5c3f3d958487d4d5f7ecf6e790c39e6ecfbec67063711ab7e0b013dd99190dee27934c6bc08de7148d6d04608e36db786dba24cddc684f5ddc3cc9f54d8aa810eb4bd03eb6141eef1a53f91d863137be1b81e62651c28a282035081911185312d2b2328022856a880ba2441f428645edd3", 0xf1}, {&(0x7f0000003d80)="d031c90b9af7aab21bab95ac9dbd50787a232533a902f680f1e9b31aaaa53c7bf0dca3022224f9b8cfdbf5c135bf0d85075528bc60a7c3cf6b016404c7179d64879cf7e5665345b73e4d04d502a41d80279be9578d3c6d8f5e8a642e0707d33ef12e762b65e93d1894354f1ef38b7bea5bf298dddc57f53f82338ac62543ba6c898605cfc82a2ecf36a0dea45a08e0008366cedc1d57b147147b3c3765789748b25c81683563", 0xa6}, {&(0x7f0000003e40)="7b6061854ca2529bf71fec3cd6b071fe4dd393819411c7448e8a1c091416b2f3c410e04b6c2fa94ce168587e86c815eaf426c7165917ec0cceca1dee50563a9d25f8a599beddc81b0f8c83ce5045ef776b15867ca9b624e72fc028eba890f642ff6c1051f346d34005964091080519a89df4b09f801c054f28d84e2bef89bf46dce3a0d53630e71bd1c8a0d296fdcabe226879749e47c0784cba8d3c1b66fb47", 0xa0}], 0x6, &(0x7f0000004180)=[@rights={{0x18, 0x1, 0x1, [r0, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [r2, r2, r1, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r2, r1]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xe8, 0x44046}, {&(0x7f0000004280)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000004540)=[{&(0x7f0000004300)="bdd0e2b449a67ab5952bb0c9919fad387c50191ecd5de29843effcc2206a9fdf4ebb302b46769a1adf92a40520008c3de94f02a4673df4455de4b2f8e371cf4a4fb9b53f04bfe681dca0d2fe7db4", 0x4e}, {&(0x7f0000004380)="9ef06aa6d122d049823a07dcf2c67be8cd2c91d58851c96b6dfb30d10167e6ac8156db101182163890215780fbe14b1f04f6a02bb51308941eabf4cc4b4186b22aa9500f11399badbca0acbfa009749d7ee99780195383a5c9c37533ad95ef2bbff26593869fb6ee15b803b27faa89b598669f2501983b41870d8e4a419dafae57fe965b5bd9354d58fc81aa88ecffcb4b89fe07ba71ffdfc23ea330b6622a29092deaa9682bac2c1dfb364d81bde3a634ec", 0xb2}, {&(0x7f0000004440)="bcfbb96d42e09539afb29ec0b036e43e63d2a747683e39bcf1f30d1e640a53fe7298a1567ba0d4", 0x27}, {&(0x7f0000004480)="fd59c991314161c167c4ade674bba5f23caab46142e9ff890254faa0e65b4748e9a4fc0c94e1b8334163123646815eb6e5885501eb81351471e531ef3778c3ed49ca497eef9b1724daefbe1db1d916e3865f911d385e6a367ea2f22c8a29906fff0a9916ff104341a7ce2ecd470799a4c8e6a331b2fc10abb77bb2b74986873e9bd5016fae2fbb7567f3553cf365884cd81cf670ebdd498c0f25a46985c014f4b4add13aad38bb", 0xa7}], 0x4, &(0x7f0000004840)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, r1]}}, @rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xa8, 0x40c1}, {&(0x7f0000004900)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000005980)=[{&(0x7f0000004980)="839e11c8209b84a48f1875eaa2c62662934ddeb67b127ace127269541ca2a989101e7938035a1a4fa3f45277fc14b87dcd7dee698448eb773e13824d08a225ac9072f391f8d474c55f61dbb2842baadabd7b569f0b4f23ace39568bae409445e9174b63f2b0266e631974969e58d769c907dbbd8259b932bcb068986ccc1cd084bf28dc5d65fbac89a9c646b454062201641b1f789de6e9f2874e2929f25baafd71dfbf5c039b62fa5503aab8023b08a000bab83c752f60f386593ad2552963575f3b084b244d2fdd65bd723fffb99be882e84a74bfd2dc58720a2147eb45b3002c0e11626cf2a44fc815d75cb17ca1ae9668111dfa38fddb94f5a36aa5db0953fc139468d7fd2e2f41e551f16c7702e069cd7983a6968292daea4d89d2c3743b3febe7ccb706a4c46896053e91560cfbeaba60d23e5405d5ab1c728ce7a7599a5f603b8e1cd2f1c4f3d3d7a366cff8228ae7c0e1b2af23748259c83819eb96efef08318743b63b42fb51de76f099f564ff60f1ba652c33a3f1a3f5104e01a67daecc9b7d7abfec9eba822c372a72699dd09d5ed5eae19304035bf5d79950f38c273b14240d3844f68275fdaf3e3b6cf373bfa28863961db58dca83829d66759864ea3e8eb6f1aca9aa1d88c6d2b1f0d2e9a0cbcccf62731af4849ffa0091cc60b5ece39eff7a7127f275a2e1a50c3372c070ffb1e308494cffbc201aa4c829cb464fd035f0e04f431141eba584c42627f2b1a76bcd41bb428befcd0925229e466d0883235e30e1cf1ce2fb84280d77d9a4caa3fafd7cecd7bb17ba490861e76299b7133068ff46f7eba8ede1aab2234fa372a84dcbc935d0c8cb50b32cdf4832039779daa9fce814fbd103e4aa7014cbbdda6fe2bef0a7527990a398a1992af75c92f1275c0a2672e91923c66bc5ee8e5c9564d00c2223ddc6ef62a669854b60cd09acdc2d27479921be744882370ccb31812bd92648068e4d1e144e438424744ed7b262bed209273a1458dc5a073f8d64126c8837e9ae6d02327a54e3a346a00bb60e21b87bec1ce14b48f3f032a3207bc5657175d97cf8762b9fa54d4009b5528fdcf35d56029e509a643255ad782a85fe8c455551e3d59c5c1440def82b7552fb0cdba8fd2f11000e2fccc2c10b213ea77d33063a9963c94e3ad6d9eb1d93d7b63d00fd91cca4fd82747bb5ba107ddaaac51d6956daebed8f1393bca4162f5347db804af9e887b62accbd3a2fbfb1ff7d2b10712c8fc2ff495ad6b82eab44b7959716f953b51ff88edf44feae8515b1bd752f7b61efc18f6ba60b7dc5504dfe881381b30de727b19e82c96651a7c6589deb5f8b40abc9e2e9f68e342926ebc363187f9f518af1d02b8514d848e923e53082179ef275facb3f34a6ee0074de5a0f9fe738247868ff3e69a4c75d41174d5a9be9035b7fef68e712e244f3beda6b8fe962b9cac00f7e63caddd0aa437d74f50840997b0b8058e41d0198cb45dd04b47d334701fb8de32522e6f2dfcb05262eb7cc3e2c0823a59ff8206e8f21c11e12366cbd77528bd97c3fdfe30d6dee14c778101936eebc512dad1943ef7556cdaae0c60db899fc2dd9349857d2cc18e10aa3a8d2063c74678323e1dfd8761cba72a0895152fbacb5facd82e42ff8401f5b908493d63b6027a2c7e7b6d6111edcd4edde2ec259cb6a7d4d40cda10503b0a6d5df4af8debfe30251bf98be83bb6dc278855c7365979ae6de90fe48e4d4b63355c76046b4049283b426ae034045c6d657de21b5656f13ff05906ccc8ed173ceef9c096bf24f5851d4c32a02ce1e20ea36b9105ae4a1aded2fa52951bef06b97691faac0491d1d92a21e51f52e82552757c712929245a4b1c07718c858b9ff713cb52cf57f0db05d7a169a497fc6bb244070382a38e96eee83f86311bfad867393bc462a7fc8a779117d2fecc2b06df1cac5761bc53f56c55ff2c6bc19fb5549e04617e18e3648321a138073582f03edd65c95f1274c72875ff6a2eb09a4c427b5b6b3eac6b4eae0d1977e01c3d0064c6c8e26508b28f2ac1e8d91c753ebc991e25734f9ae475a7e0109f4e3c0584b9c2720d9337094dabfcf9bdf5860833888e2e9b1dc4654e0f5cd86cfa98dac7a5d5a5f2b1556ac9361c8a2d52328f1f33bf5d3301176e4cab9fa7355cd1a7d698740a299f083a3edeb2b4b24c1d916ac1c49c209bc14d79b947b63ce403d82538406f86135c22938a2a77a574b2903b2e74ee6b9889d6d84d958ae779da6a2c98f5874d9956e6e4c29f24163eb60cd21471d53dbb819a1c071d0d8ec21ec1b3d7fd65d871639ee2c7246f227636a47a576326430719c1e1373d6f8ce1c991eafd27d3758137f616b6b291ce35b787e4dcbba1478ae14ccdc7ab7ce85d4ac17c70a94632e167690311ac0b4a4dbffe8977e6c75b5051cec56afb5626d072e1186ba57e00fcef5dc109f1658ecc0fca152ff34f92705b7d8280e91af6455751b05e902444cbd78fc4fae78b1b6b7f9acf80ad1ee2556858e5f5b497f88f641f5d6e11a24a599ece152180ac8145ac0cb143f669bab78a076b64f9ab409a87d36e924a196356f53afbe6a3569bcb314f3b5b95b673f153a54acecd9458d9790efda1ac560ac1ef7a16c8a69b57af66f2a61b92b61d0dbe4b6c020fd2c5421f981b768002daec059b78ef016fa2aab1247a2968f711dc0235770de80a8f745f5bf6f0d3d44f6d2c740cfd3eaefc116c6989fec879a2cc7213fced581c356632233a29e3be23eb18773bb60731ad03572228b5ab6ea9d9ddf1e095297e0a1779c5dda6243d2918a3473b1a6a28c1e7702735b76f07fd18e053e0e3aa296dc34f0009f395bdaea4e423a6f8805448a6dfa3942bb9fc62f037263ed1145f6b38a87ffe96498f84eb08f782a6de8eb46dcd21b97b9384f2e53d1375f53120fabe4a31c574b503fdf1c1d8b2675db7a1c7a2ba5bfdc0e63728bc434958bf0f5134a5f8f410008767c85c1cdb6759fae78a699841bdffe058212f3c26b570dbf728573c8a1a25bc562648fc291eb6c11ee2d48a59df12a09e9b397e55bfa53e53a682d75cba98ee0a6dff95bfa1858e7f41049b896bdf3f6dd84404c1a1872628d77b99027f851613f8b256d59c116e5aeb720537abfe207aa485357f58c495f3cbc40afa261a84df0c78c0b905044bf540bbf41d41cc684543d9857e788af6098a795b245d8ae488350ff60a9374795e244b33dcc494dc4890f1b2ea517468b193675b133e71ebddc95a3a37eadd5fad2b3632f7e55ea5e0d6bacd627efd045f264ee68c5efa9481e142ff1c675bc0ec09886060b9c34774586f43599c8153fcf8185218ec2105b10fb7813e31e3db7ad0ce7579a12fe3dcd020411290fe528a4ba9c60652604a39f6ef445da761f221a43409808083e073e12db36023caf75ba6b5421ca4f976f793d63565f816410984f5bd32f2710be05e1249648c36dd67f84f023c35c2e9005c535acd673ddfd68ec922b49435a323d2431f58e46ed7b17a848d7bb7aed90d7f40fe2481c76640a5f03f33621d2c60e141efcea20f94c0549cb2e4f1161cd671b7e582bd27860876f40359edd72db1fb480be462afaadf9148865dc083b7c861072d69f182226b09b69011bfad1ac5bbbb3ad06169e77626f014d91c2287bd831df5e8cca6beeccf4e849efc66f8ad613523e2c790c8833b0a9153f57772ec587b153cd9f0cafadc9bad7ed2e983f5e835f65352914f13234fcd0bc231b4cfe5c8a3e8f01eb3bf576d62429ad7522f7709653a8fc75cb06cd5fa7d358380d134b9e01bbdda6bbefe61113fdd8a319eb3d7208d25076875ae7de9ce3379d8d33c7beeb1be871e68d19191c03c151a0b309879103d4334072dcb533dda508cc96cce6d3d0ea68db98505de6d8e584c7446fe95becabf1b0dc27c4dfacb5128996077019153308fd5c5ef261dc43083f51b7678870ae44f5e840ff682df03eb2563511ea8f6d1099652967f315be1fd5c4d9686852d8776ee3013b0b62c438c273d7c753fd5ad5e28311b0e55a58567ca96089c6e72c3af49662a72e229e0ef2dbc583fb65740efedcf6fe656e7d2bf02dd0b6666b041a25d6238aeecefbdc74d4f236de030b23f7a4a5547b26968118a89b22a21e5f57dd90e3ef9c13c2e5834727726cc954fb36539cc36b3417df7d94178127c9d11d663d7517afe60e23c4056341551700082384324f68bfe1656a9f47e8d7eb010116a129798e420864f10fa75f621723064d93c374bd4c0bac36df71f2f90070602336ec8228267054fe04a7b648ed50cc89f0280af3f6bd73287aca9dc8dc830988725c82c5bdfae31e0487644e0c4e9bade27a6c48ab88227bd6982a90316cd82841ae01237df35ee7d9d4cbb074d93c81bde704613d458a36e692c4a174f696db3c4e300ff6bc25bd9827c8b5a95f9cb263d6a8460ba5692ea75c83ca2650220803555cca7d99f9a210a0a7458e9d2adab13f2496d990a8283098af3ce491828666b5e2e63d4f12595a87f9bf7c7a4e24d2793ddf52834dcb9699559ee5d5ed3ef70cb1f2c2bb469505456b4ec6d670cb3ff84cf4ce7e4d824754c8768e3bf14a5881030b9bdb2e53b7198667e9d63d069d775da32bb73b6c61960af85e8cee0d0ae36b48058418cf827d73bed6b73c401958008ff0d98a303b76a0889953d81771dec4fe2b844ab6f029a5b9a14e6996919b6886971f9b96179c2868224f9f1e8a97be39edb444c938cd7c0b8a9a3860889f84ea0902ca9347c330a86c768a08a982b6a1264fcf103e66abe9d47df3f32a3ea01c42fefb77750fa04953ee5574f3533ec6463a57cf53b937132746f987217b5872888d6fce8b89190a1e060c1debfc4a975b02631c0ff7ecac87ba8405a8179b3d4e83cbbbc9e44ed0eba77ed49789a7606d617619912a94cb12e4c4ca35f572107feebb6475cbbbd652d10c56eebad71bf0aaf322847e32cb81a22395efacfc39921cf3d6fee9bb94b741b3ddea7d036176113a7293d402c45d59c341a9de4eaf5fe501bcd703954d9ff42d79b52107f68e249d9fa37ccbc798a1775c59c13774df90eed9fed90190bab2550ab01b19ba9f0c009b4d670e3f8b288d32d1ff44fa4599fb243b3bb67c8beabd7f5d0ac7bb5a5df0cf4b0e0c1e0928f08a30a476bd5e997849dadc2f886cee06664fbd046e07361d0ffed94dbc97ff9c37ff6f9bea5e68b63e578e5968700f6f3b25329ed675d765499357398de35a87b9f4e05d77dce54949bec4a951a32e95b053e81781f9644163d39299e8307859d2bb3fcfa305d6802d7624e4cb1b34fcd81f82cfefba6990cc152d013a738dbbbd961351b0ac98d323bb33bb176d04288a5bc2933978a4764e5ee899381ef5668657285c65f4b3dcd11bf972e89a4a98ca4e5bc1115a968a16f242525c1400bf5d620225c664dbb6d4f46bf34a0389fbcfed6cccd3500df4a5e38530fb76e7b8e2720dbe3561da787231486f6ccc792598163d475a7e6e697d91befa8d23b82ac6c76d8ab884e49e2c45fb86a561d1407258f592a231994068638085d0d6d674a7f1b8339b8da2cc249c27416ffc370e16dfad99899ea331fefbc399d3f2b86fe7daba1ca7d9307aad0cc40fa5f47d63213cbb9183c7abf587a05abe8ddf9711cfff03f46a80e4ebb66383ebfdd685fd5d35f9f605ed6d95e3e6bd381c0214cc2e4377f5586d2a282c452e372f407f9b97b9d0babcc30fb4d32b97e032d1e119d0a1e70fd1cd44604032adb974df9dd9fe0ffe88b", 0x1000}], 0x1, &(0x7f00000059c0)=[@rights={{0x18, 0x1, 0x1, [r4, r5]}}, @cred={{0x1c, 0x1, 0x2, {r6, r7, r9}}}], 0x38, 0x1}], 0x9, 0x24000040) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:06:52 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsu\x00', 0x12000, 0x0) read$fb(r2, &(0x7f0000000400)=""/208, 0xd0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x14, r3, 0xb03, 0x0, 0x0, {0x10}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)={0x180, r3, 0x20, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x44, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xe9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xb8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x417851ec}]}, @TIPC_NLA_MEDIA={0x40, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0x68, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe961}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xda}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x94bf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffff800}]}]}, @TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffff2691}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffd}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}]}, @TIPC_NLA_NODE={0x38, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x67d}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x180}, 0x1, 0x0, 0x0, 0x8008}, 0x20000080) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r4, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) ioctl$FITRIM(r4, 0xc0185879, &(0x7f0000000500)={0x4a0, 0x1, 0x8}) [ 439.385203][T16627] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:52 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 439.471266][T16629] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 439.488954][T16634] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 439.638530][T16640] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:52 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="850000006d00000025000000000000009500000000000000afcd48d6494d614d1612ba392176dd2963228e1d69ba7ea94c500dc4ef2fad96ed406f21caf593836d9ea2cfb0e60436e054258c4686b066707de94a4f4d5fc79c987d669f2b1faca0f9d9924be41a9169bdfaf16d1c0b153911b8dd7f165789c691de6eee84309e7a23c19a39484809539fca4e0b6ec015a7d55545a34effa077faa55c59e88254f54077f799bf1683537a8ea0244d35b213bda80cc172afd80e361bedd8b8cc57255a5e3d77ac463920e231b7ae0da8616d2b7958f9005d822175ed60ab386d94af98af1da2b59525f8fe3b28d7e53c78fbfe5ab0255f347160ec8343e1494d3a63e57a15cf10453f6c0bb13b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0010f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f132a902e5111f2cc5e46ac1c60a9b10c074bfbcd4b09012175484135f0e519f0b1c4aaa026d570ecb5e8cddbed65ff76ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef479570c8ad943e392957b4f979ea17117a13201bafe4f0f6ea5a6c957ada0c548552b571bed5647223e78a99625bbca4fd91bc404ec13eaa66580ae7b813071cbb17d9f37282462f03de147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb5567e54d3504723177d356c4604b7a492ecec37e83efceefd7ca253cbc8edc8be05cc85451c6a14507434eb54b6f43caea5c4bf690441974b155f5adc6825a3a3d5b754df23175e2ce8b03bf3e3c033e54e4ba9b05292bfdb26f4cd7e166cc384b2845c537b397aaea0eac888419583ccaba598e6d8024920428e070ff941dd7067cb53879c3dbfa852e8fa7aa3d926c6d8aa1f82c76bc59352e82be8e52dce88f66bdb061681fc3b393f75eb23d5c6b4c0ac8ef660a37342f1d9a5d5c14b6b7e8611e5d311a20213ed6ac7b8d66fcc4b7454316338d928b8fff2739e811784d6873207c10ac73e264a6e65bf33020fc466df9ed2764ee2d076e5b68fa1642ebf17caf01bce8e02c31a13ceb7fed854b0625741964fdb2737505f8f584e4c14bd36b9e0608843fc32c6642091765068554ac92b42e467f69b499ecef34d2e6195365822b5577b3dd5f5c3424e7b6faea95c0109873eb52fb8e5a604c8adbf404a4dd79ce8c29f968f56dd583c3e9875678ca16f6b579cde0c1a0ab95f99620e84c0487e6565c04de458761768de308ff95a7189a7731378f0b171f99240f8167693329744d0e41639dca4859753d3"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 23:06:52 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 23:06:52 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 23:06:52 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) 23:06:52 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2, 0x0) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000080)=0x3ff, &(0x7f00000000c0)=0x2) creat(&(0x7f0000000580)='./file0\x00', 0x4) ioctl$VFIO_CHECK_EXTENSION(r0, 0x3b65, 0x8) syz_mount_image$gfs2(&(0x7f0000000100)='gfs2\x00', &(0x7f0000000140)='./file0\x00', 0xfff, 0x2, &(0x7f0000000300)=[{&(0x7f0000000180)="dc666445769f26b53f2d29756cdfa9331fe7f898e959605c516aa57e9c317dc1a93d3218c988f2784eee3e5aaf7d140fd4a9af69a0c5495aa8e6ec06b7147f238df9333ebbcc1422dc5fd61b790bd2b48b0fee8d8ccda9f988d32d527495f9b10f00cc8f899be7d727282f93f8f10c740c4bafde82cc37d2e1f6f8f4564083a8da7433344e62335384ca77", 0x8b}, {&(0x7f0000000380)="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", 0xfa, 0x6}], 0x0, &(0x7f0000000480)={[{@barrier='barrier'}, {@noacl='noacl'}, {@localcaching='localcaching'}, {@lockproto_nolock='lockproto=lock_nolock'}, {@spectator='spectator'}, {@statfs_percent={'statfs_percent', 0x3d, 0x4}}, {@quota_quantum={'quota_quantum', 0x3d, 0x5}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@dont_measure='dont_measure'}, {@smackfsdef={'smackfsdef', 0x3d, '+nodevcpuset.keyring(-'}}, {@seclabel='seclabel'}, {@appraise='appraise'}]}) 23:06:52 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f0000000080)=""/195) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:06:52 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) [ 440.356181][T16659] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 440.421077][T16659] gfs2: Unknown parameter 'fscontext' [ 440.432452][T16666] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 440.453010][T16659] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 440.472084][T16671] gfs2: Unknown parameter 'fscontext' 23:06:53 executing program 3: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x50, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000040)={0xffffffff80000000, 0x1}) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r1, 0x80184132, &(0x7f0000000140)) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2f62643000933b9b252ef9b97c0e4c100000000000"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) 23:06:53 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) 23:06:53 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file1\x00') ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) 23:06:53 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000080)='ns/pid\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x10005, 0x0) getsockopt$inet6_mreq(r3, 0x29, 0x14, &(0x7f00000000c0)={@initdev}, &(0x7f0000000140)=0x14) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:06:53 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) [ 440.689003][T16681] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 440.737052][T16681] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:53 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='/dfv?nd:9#'], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) 23:06:53 executing program 1: r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 440.802645][T16688] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:53 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = accept(r1, &(0x7f0000000080)=@in={0x2, 0x0, @loopback}, &(0x7f0000000000)=0x80) mount(&(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000140)=ANY=[@ANYRES16=r2]], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x1080025, &(0x7f0000000340)='/proc/self/net/pfkey\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$cgroup_type(r4, &(0x7f0000000100)='threaded\x00', 0x9) openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) [ 440.876871][T16690] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:53 executing program 1: r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:06:53 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00'}, 0x10) [ 441.143361][T16701] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 441.170635][T16701] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:53 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x0) bind$x25(r0, &(0x7f00000001c0)={0x9, @remote={[], 0x0}}, 0x12) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="2f6465762f6e626430002344412f882feee434c95f8840c25f44b02cce9c73d731628c54b46e14cea7c5f05e53df9f5af2ad6eb6d8f6ed200ad921141ab24a74edf5f2ad3ffc3e37977183e61369c8dc5e6aebed5fa0ea28b3219d755fc420d4"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v2={0x2000000, [{0x6, 0x6}, {0xffffff7f, 0x20}]}, 0x14, 0x1) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r1, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) accept$unix(r1, &(0x7f0000000200)=@abs, &(0x7f0000000300)=0x6e) 23:06:54 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') 23:06:54 executing program 1: r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:06:54 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@sg0='/dev/sg0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000000)='tracefs\x00', 0x2a2080a, &(0x7f0000000340)='/proc/self/net/pfkey\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup(r1) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_dev$tty20(0xc, 0x4, 0x1) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x18, &(0x7f0000000080)={r5}, 0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000200)={r5, 0xa4, &(0x7f0000000140)=[@in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e24, @empty}, @in6={0xa, 0x4e23, 0xe278, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}, @in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e23, 0xffffffff, @dev={0xfe, 0x80, [], 0x32}, 0x400}, @in6={0xa, 0x4e22, 0x9, @remote, 0x3}, @in={0x2, 0x4e20, @empty}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x3b}}]}, &(0x7f00000002c0)=0x10) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000300)=r6, 0x4) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r7, 0xc0406618, &(0x7f00000000c0)={{0x1, 0x0, @identifier="229a0d023167a6f6df9637e83f43928d"}}) 23:06:54 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f00000013c0)=ANY=[@ANYBLOB="0000881daaaaaaaaaa1caaaaaaaaaaaa91000e00810005000805003f00ca8883344f2beec18787a1e93688aec44e147a2041609a9eaed5bcda97fdaea0c41576"], 0x35) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x86c266286dc14e84, 0x0) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000001100)={[], 0x4, 0x400, 0x9, 0x0, 0x7, 0x100000, 0x1000}) prctl$PR_GET_NAME(0x10, &(0x7f0000000100)=""/4096) write$binfmt_misc(r0, &(0x7f0000000080)=ANY=[], 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000)=0xc3, 0x4) openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r0, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x14, 0x7, 0x1, 0x102, 0x0, 0x0, {0xa, 0x0, 0x2}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x44800}, 0x4004010) [ 441.457245][T16709] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:54 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x1008000, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) [ 441.507755][T16712] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:54 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@md0='/dev/md0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000000)='omfs\x00', 0x98098, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:06:54 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 441.510435][T16709] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:54 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xbe4c8a1a2dd4c715}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x140a, 0x400, 0x70bd2b, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x85}, 0x884) 23:06:54 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 441.926638][T16742] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:54 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) r3 = geteuid() r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, 0xffffffffffffffff) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000000200)={0xfffffffc, &(0x7f00000001c0)=[r4, r1, r5, r1]}, 0x4) setreuid(r3, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f0000000180)={0x3, @default, r3}) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x101000, 0x0) ioctl$SOUND_MIXER_READ_RECSRC(r6, 0x80044dff, &(0x7f0000000080)) mount(&(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYRES32, @ANYRESOCT, @ANYRES64=r3, @ANYRESDEC=r1, @ANYRES16=0x0, @ANYRESOCT=0x0, @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYPTR, @ANYRES16=0x0, @ANYRES16=0x0, @ANYRES16=r6, @ANYRESDEC], @ANYRES64]], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x10000, &(0x7f0000000340)='/proc/self/net/pfkey\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r7, &(0x7f0000000280)=ANY=[@ANYBLOB="00000000bbbbbbbbbbffffffffff8100000008050000000000"], 0x19) write$binfmt_misc(r7, &(0x7f0000000140)=ANY=[], 0x1000000c8) ioctl$VIDIOC_TRY_EXT_CTRLS(r7, 0xc0205649, &(0x7f0000000140)={0x9c0000, 0x5, 0x2, 0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x9f0a8b, 0x72, [], @p_u32=&(0x7f00000000c0)=0x1}}) 23:06:54 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:06:55 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:06:55 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x2, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getresuid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000080)=0x0) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000200)='./file0/file0\x00', 0xed5a, 0x4, &(0x7f0000000540)=[{&(0x7f0000000380)="bd2eca2a5d4fd33f11ee39ffb36dcfaae4eff6a928ee6e086b5457df873c2adf64c0b1fd4552e4d1c26b24f08de695d7d2aaa6fc82808d7dfcd6a90a846c92a375553e7e97d9f2f7eeb2a94f0808db1226553d48297991f66ca113ddfc6138", 0x5f, 0x1000}, {&(0x7f0000000400)="cce61fb1adf1ee9090b23b07c10a115a34c9bdd57f9033d7cc532abb0994a244b4ec1dac95a89b92945aa03bf2bcc1044a55b4f1eb14f3160e7f9b11976b883f11992fcf00000000000000", 0x4b, 0x3f}, {&(0x7f0000000300)="a6344d759fc039d9b997bf1648808aa88388aebee1a2c3f8082153352046f7e3d11991f9163f11bb7a352172f84b60eabfe334165dbf89b0510152ad29", 0x3d, 0x2fa}, {&(0x7f0000000480)="18b63604597663a587c5ec7d8f3d4c00a14621b5a0be19d68a77af88a0d1052a65b2ee1107c58d368a5a7b9d4ee76634e1eb6350f1facca29a8584694ba7f945b56de971659339d4709f05b35cdd21b07c57e67d29e6d589dbfc9f5398971e8842aa5f48bc475da1c9d2d0e41d366357f0a5be0a52b17eaf1ce26cd07ae1b5ed5e491de72c174824db5c2dd4559db7c01d28b7917cf515f53443b6443068e07a7b4bc4ded61387740ac230d224694a21ff0a", 0xb2, 0x2}], 0x2200000, &(0x7f0000000840)={[{@device={'device', 0x3d, './file0'}}, {@ref_verify='ref_verify'}], [{@subj_role={'subj_role'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@smackfshat={'smackfshat', 0x3d, 'subj_role'}}, {@smackfshat={'smackfshat', 0x3d, 'vmnet0em0cpuset[['}}, {@subj_type={'subj_type'}}, {@fsname={'fsname', 0x3d, 'udf\x00'}}, {@fowner_lt={'fowner<', r1}}]}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) r3 = dup2(r0, r2) recvfrom$unix(r3, &(0x7f0000000740)=""/253, 0xfd, 0x2001, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x20, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:06:55 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="626430040c13748dd7a22dfef2f3c694577de0ee27ff1e4c434190f57fc9b4ae35b28d371fc63f9aa59978880e8bcd48a9e930f76e314dd1553576a0e273ee7f0c000000000000213dbe32d5156545ec5d854536dacc02540c96db84c1494006bed8721588d5f2bec1bc374c018d6d3224c1cc38e0414bbd9da02eeb516a944fc10664ea6f2f41749565f4840bbf"], &(0x7f0000000280)='./file0\x00', &(0x7f00000001c0)='vfat\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000780)='/dev/snd/timer\x00', 0x20000) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) syz_mount_image$reiserfs(&(0x7f0000000200)='reiserfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000380)="be05fa6cbf6efacdc9fe3413d24a20805ceb657ed7e317ed9667badcfa3f2a906e37728f70e1f2f8b85b9bfbf5909f579e39ebf0d35a53f6c0228e718ca945faebb35e8fdb3f835d2ad89e377dfddb376591d52ed8d0745d31b41a44036ffcd12bcb766af0ac8fded8719385a51aa82dccb2e2b9e9f3f99ab3b5493bf31e233d46c3d549ec8b43d6bcef529c5b80ddc29f0764fbbdebaf67cdbda852de413ac7ca57fcfdf7fd3b3c185e69ecee92589547dd283e7a839f8e4dfc6d54a376963427a243bd382c510a529e753c93426a9206040fc5917585cc5b101d30f08abc7d74df72a713f0df21ad668d7466190f9954db0c690297", 0xf6, 0x6}, {&(0x7f0000000480)="8f8a121e009d9e9c6203c0b6ea30d89d8bb61cfffef3287314de6848d522ff75794d2d9d7acbf415a983331772d13c940bb67fee6958607141fd650d401097462659b965f104247118d83dd41eea88e1b892dc75e462bf33afdc9803769fc8655d25c3b2bd3759c31c95d14901d7b55206a0647822aa0ca2d9ecd371658eb229040f7dc9140e5308b2db", 0x8a, 0x6}, {&(0x7f0000000540)="3cf5dd35bc19127ec8ee20b6802ffec8da03a9c5580b7ac840bb7b424a7ff40c3f2cba90eb547ad7ec623c37abac2e7e88d75ffc8b5df108bbbf548d9712ee1bffa5bff5eaeca66823c03ba070ca7209e24c05f41a49a82af59b67db315bee2360d1e2b9cccf2c5926b9eeafba990b419dd0e295e2ca4175ad9c319e9e3a70c1db8ba08b33c15f689ae30201a7cd79cb770786944eb42ed8ff4d988a49b8646afe58ec8445731649533708485e8e", 0xae, 0xb8d2}, {&(0x7f0000000600)="20c6b100bdf0e62f343c5a8cb4c891f45d469f988c6f62af50e27050212d2e7da6973889721386de81ae183b0f3cdb0a2c3903ddd1f47c960e9beab11aed94d1a52e0c608442c85caeb6b404e1ae5ba89c795e31bff7a0a927a83bc4985996dcf3c6beedfd2cda003f957ff331dcef26727096874eeef1dd6bf731fbdb000ab6c4d4cfbc50c7d6ab548a41", 0x8b}], 0x801000, &(0x7f00000006c0)={[{@hash_tea='hash=tea'}], [{@audit='audit'}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x32, 0x63, 0x0, 0x64, 0x38, 0x63, 0x64], 0x2d, [0x30, 0x65, 0x37, 0x9], 0x2d, [0x66, 0x63, 0x61, 0x64], 0x2d, [0x30, 0x66, 0x35, 0x36], 0x2d, [0x33, 0x30, 0x0, 0x66, 0x63, 0x35, 0x37, 0x37]}}}, {@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '*@'}}, {@fsname={'fsname'}}, {@dont_hash='dont_hash'}, {@obj_role={'obj_role', 0x3d, 'trusted.overlay.opaque\x00'}}, {@dont_hash='dont_hash'}]}) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) 23:06:55 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:06:55 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2f64bd6795588aa9e8fad9fe03552530bd2b9525537547ad756ba075130d06a38f221bdc54a5bb1433e13968c56509a0588930b0e15cafacb5f819d0efd41272ae8ef341b044f230637227df0209204e0b368f11a95d00"/99], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/sel8\xb1\xe6,tC\xf1\x01\x90-Ye') ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) 23:06:55 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2f6465762f6e626430a9c2605324c300"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0xc2c81) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@security={'security\x00', 0xe, 0x4, 0x3a0, 0xffffffff, 0x1a0, 0x0, 0xd0, 0xffffffff, 0xffffffff, 0x2d0, 0x2d0, 0x2d0, 0xffffffff, 0x4, &(0x7f0000000080), {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x5, 0xffff, 0x2}}}, {{@ipv6={@rand_addr="453316a3579758175236fc96514c663f", @local, [0xff000000, 0x0, 0xffffff00, 0xffffff00], [0xffffffff, 0xff000000, 0xff], 'geneve1\x00', 'ip6tnl0\x00', {}, {0xff}, 0x2e, 0x5, 0x4, 0x20}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00', 0x0, {0x6a}}}, {{@uncond, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}, {0x7f, 0x4, 0x1, [0x7, 0x9, 0x0, 0x9, 0x4, 0x800, 0x6, 0xedff, 0xc2, 0x4, 0xfffa, 0xfa46, 0x1, 0x25, 0x458b, 0x8], 0x5}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x5, 0x976, 0x0, 0x7, 0x8, 0xc4, 0x8, 0x80000001]}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) 23:06:55 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:06:55 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0xc000, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x6c, r1, 0x4, 0x70bd29, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @dev={0xfe, 0x80, [], 0x30}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x40}}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'dummy0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @local}]}, 0x6c}, 0x1, 0x0, 0x0, 0x40004}, 0x40) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="b50324cc4d7868643000791665c667e913eade2dbb5e7e9ee7427bfce1dfa24d9a5ef5a6fe1c23c025f5b5db3df59c4f8af2fdd2d9985e023f7c46a08a211360c7247d48015e1fb2c6247104daecb5788fcbfe9469821fcdbdaf8b75abd7ec555c169f3feb7d26fc653188f3302658efebbca59f75bd9e7e3d70a217539b916850fd52d32dea4be4bf411e4822003134222650809096a6000000"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') creat(&(0x7f0000000040)='./file0\x00', 0x5) openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r3, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x1000000c8) write$tun(r3, &(0x7f00000005c0)={@void, @val={0x2, 0x80, 0x7fff, 0x5, 0x0, 0x8}, @eth={@multicast, @broadcast, @val={@void}, {@x25={0x805, {0x0, 0x0, 0xff}}}}}, 0x1f) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x1000000c8) sendmsg$TIPC_NL_MEDIA_SET(r2, &(0x7f0000000580)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000540)={&(0x7f00000003c0)={0x178, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK={0x98, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3f}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x2}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2b}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfb}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x100}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffffa}, @TIPC_NLA_PUBL_LOWER={0x8}]}, @TIPC_NLA_SOCK={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7f}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0x18, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x639b}]}]}, @TIPC_NLA_LINK={0x1c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x178}, 0x1, 0x0, 0x0, 0x4000}, 0x80) 23:06:55 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="850000006d00000025000000000000009500000000000000afcd48d6494d614d1612ba392176dd2963228e1d69ba7ea94c500dc4ef2fad96ed406f21caf593836d9ea2cfb0e60436e054258c4686b066707de94a4f4d5fc79c987d669f2b1faca0f9d9924be41a9169bdfaf16d1c0b153911b8dd7f165789c691de6eee84309e7a23c19a39484809539fca4e0b6ec015a7d55545a34effa077faa55c59e88254f54077f799bf1683537a8ea0244d35b213bda80cc172afd80e361bedd8b8cc57255a5e3d77ac463920e231b7ae0da8616d2b7958f9005d822175ed60ab386d94af98af1da2b59525f8fe3b28d7e53c78fbfe5ab0255f347160ec8343e1494d3a63e57a15cf10453f6c0bb13b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0010f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f132a902e5111f2cc5e46ac1c60a9b10c074bfbcd4b09012175484135f0e519f0b1c4aaa026d570ecb5e8cddbed65ff76ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef479570c8ad943e392957b4f979ea17117a13201bafe4f0f6ea5a6c957ada0c548552b571bed5647223e78a99625bbca4fd91bc404ec13eaa66580ae7b813071cbb17d9f37282462f03de147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb5567e54d3504723177d356c4604b7a492ecec37e83efceefd7ca253cbc8edc8be05cc85451c6a14507434eb54b6f43caea5c4bf690441974b155f5adc6825a3a3d5b754df23175e2ce8b03bf3e3c033e54e4ba9b05292bfdb26f4cd7e166cc384b2845c537b397aaea0eac888419583ccaba598e6d8024920428e070ff941dd7067cb53879c3dbfa852e8fa7aa3d926c6d8aa1f82c76bc59352e82be8e52dce88f66bdb061681fc3b393f75eb23d5c6b4c0ac8ef660a37342f1d9a5d5c14b6b7e8611e5d311a20213ed6ac7b8d66fcc4b7454316338d928b8fff2739e811784d6873207c10ac73e264a6e65bf33020fc466df9ed2764ee2d076e5b68fa1642ebf17caf01bce8e02c31a13ceb7fed854b0625741964fdb2737505f8f584e4c14bd36b9e0608843fc32c6642091765068554ac92b42e467f69b499ecef34d2e6195365822b5577b3dd5f5c3424e7b6faea95c0109873eb52fb8e5a604c8adbf404a4dd79ce8c29f968f56dd583c3e9875678ca16f6b579cde0c1a0ab95f99620e84c0487e6565c04de458761768de308ff95a7189a7731378f0b171f99240f8167693329744d0e41639dca4859753d3"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:06:55 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400a00, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) sendto$inet6(r0, &(0x7f00000000c0)="4b69bd8901b852e38e5f65c48cd0a1ca9ef0ffba8a5670c989c4ff39621e91048e1103cc2f3fb828cf184d4d7d83fe163a68003352f1367ebb25d18dc3a74d4071b8a822be1ef406e8269bd85b2c7ecfd4b31a07cc11e69d4c59dc517e06784a620c1d5803e5846a8e2244caab889754795bc50759f15d6d54", 0x79, 0x4004, &(0x7f0000000140)={0xa, 0x4e22, 0x5, @loopback, 0x3ff}, 0x1c) 23:06:55 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='/lev/nbd0\x00'], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:06:55 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 443.167880][T16797] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 443.211037][T16797] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:56 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@md0='/dev/md0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x12000a, &(0x7f0000000340)='/rroc/self/net/pfkey\x00') 23:06:56 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f6465582f6e62d241b0"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x230800, &(0x7f0000000340)='/proc/self/net/pfkey\x00') mount(&(0x7f0000000000)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='cifs\x00', 0x44, &(0x7f0000000100)='/proc/self/net/pfkey\x00') 23:06:56 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="850000006d00000025000000000000009500000000000000afcd48d6494d614d1612ba392176dd2963228e1d69ba7ea94c500dc4ef2fad96ed406f21caf593836d9ea2cfb0e60436e054258c4686b066707de94a4f4d5fc79c987d669f2b1faca0f9d9924be41a9169bdfaf16d1c0b153911b8dd7f165789c691de6eee84309e7a23c19a39484809539fca4e0b6ec015a7d55545a34effa077faa55c59e88254f54077f799bf1683537a8ea0244d35b213bda80cc172afd80e361bedd8b8cc57255a5e3d77ac463920e231b7ae0da8616d2b7958f9005d822175ed60ab386d94af98af1da2b59525f8fe3b28d7e53c78fbfe5ab0255f347160ec8343e1494d3a63e57a15cf10453f6c0bb13b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0010f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f132a902e5111f2cc5e46ac1c60a9b10c074bfbcd4b09012175484135f0e519f0b1c4aaa026d570ecb5e8cddbed65ff76ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef479570c8ad943e392957b4f979ea17117a13201bafe4f0f6ea5a6c957ada0c548552b571bed5647223e78a99625bbca4fd91bc404ec13eaa66580ae7b813071cbb17d9f37282462f03de147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb5567e54d3504723177d356c4604b7a492ecec37e83efceefd7ca253cbc8edc8be05cc85451c6a14507434eb54b6f43caea5c4bf690441974b155f5adc6825a3a3d5b754df23175e2ce8b03bf3e3c033e54e4ba9b05292bfdb26f4cd7e166cc384b2845c537b397aaea0eac888419583ccaba598e6d8024920428e070ff941dd7067cb53879c3dbfa852e8fa7aa3d926c6d8aa1f82c76bc59352e82be8e52dce88f66bdb061681fc3b393f75eb23d5c6b4c0ac8ef660a37342f1d9a5d5c14b6b7e8611e5d311a20213ed6ac7b8d66fcc4b7454316338d928b8fff2739e811784d6873207c10ac73e264a6e65bf33020fc466df9ed2764ee2d076e5b68fa1642ebf17caf01bce8e02c31a13ceb7fed854b0625741964fdb2737505f8f584e4c14bd36b9e0608843fc32c6642091765068554ac92b42e467f69b499ecef34d2e6195365822b5577b3dd5f5c3424e7b6faea95c0109873eb52fb8e5a604c8adbf404a4dd79ce8c29f968f56dd583c3e9875678ca16f6b579cde0c1a0ab95f99620e84c0487e6565c04de458761768de308ff95a7189a7731378f0b171f99240f8167693329744d0e41639dca4859753d3"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 443.521873][T16811] CIFS: Attempting to mount /dev/nullb0 [ 443.552038][T16811] CIFS VFS: Malformed UNC in devname. 23:06:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x10005, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000000), 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:06:56 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 443.583504][T16813] CIFS: Attempting to mount /dev/nullb0 [ 443.611468][T16813] CIFS VFS: Malformed UNC in devname. 23:06:56 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f00000000c0)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=""/32, 0x20) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') [ 443.694126][T16816] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 443.762094][T16816] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:56 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f0000000000)='bfs\x00', 0x3408ec, &(0x7f0000000140)='/C\x1b\xd9\x84,\xfdSB0z\x05oc/self/neT/pfkey\x00\xfb\xd2\aI{\xa2\x96P:\x85j\xc0/\x9113ez\xc8\xb3y\xf7\x81\xe4g\x0e\xa2i\xd0\x92~f\xff&\xb6\xed\xfeY\\j\xbc1\x17*\xdf\t\xa4X\xce\xfa\xaf\x7f\x12\nG\xfe?\x1dVi\x1a\xfd}\x1e[\xac\xa8\xe0q\xa9\xc7@\xd3\xec:\x17\xc6E7\xaf\xa7awX\x8b') [ 443.945738][T16826] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:56 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:06:56 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@sg0='/dev/sg0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/pr^c/self/net/pfkey\x00') 23:06:57 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket(0x10, 0x2, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000200)="3081a3", 0x1001, r1) r2 = add_key(&(0x7f0000001840)='big_key\x00', &(0x7f0000001880)={'syz', 0x1}, &(0x7f00000018c0)="530ac62d6044cb6b750afd10c488000ceb656c003bf5b63ba6f23fe11113dc4198c65f41964ba22c7028bf4f351b562b41c2ec280698e04b53098b6a0ced17167ff89f74c20edb49e3a112eed68871b793f3df90300051b1cd54eb27b1f6d8ac8c42f67bcb584f7cee018ee390c093afb976a0ef210f060085f3d0942c7d4d619ea27dc0fc50d9bf630b7195ab728f82256935918619907c46ebd358fab49e18d6efd8ed6f9949ac2637160306ae9baca40d4d377fbcc0f7e26ccf4a312af4ba69c4c3cb2624f7302394db61e37b6020b92a3fa60e6ecc5d494d96b0b29da02d64a3ee885639803d5e944fca8eb0a38a433e2e3d", 0xf4, r1) keyctl$clear(0x7, r2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r3, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r3, @ANYBLOB='\x00\x00'], 0x34, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r4, &(0x7f0000001a00)=ANY=[@ANYBLOB="00000000bb0117348521f5bbbbbbbbbbaaaaaaaaaa32810000000805000000"], 0x19) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) ioctl$EVIOCSCLOCKID(r4, 0x400445a0, &(0x7f00000019c0)=0x100) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x9, &(0x7f0000001640)=[{&(0x7f0000000380)="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", 0x1000, 0xffffffff}, {&(0x7f00000000c0)="7d1318be237827ad45342903c5777303c54dba3023a4183e1b465b087a009268cc7644e244b77f5236c229082999b451ce4cf2b0b6b653ab9deaeb240bc9fb2f705b94d22328d5d142d19c58011c5a30a8671e91c223", 0x56, 0x1}, {&(0x7f0000000140)="9a35ad3a783880d708515d64a5504dcc6751f77cb1b4336d60059db547beae50c437e5bd231ef8282ed55824d00de60a1523b65ac7033dd1f1d701b1b118d8e671c2d493b2438806d8633c6c695c59e9b104a7e0ad6c8fc3a730a95538bed539618bb2020bd39ec14ad7e480afafeff4fd4dd369fe5132b7a3a3dcd0561e9489c6e2a308b0ac5adce389da404dff30c7e7afeabf556c0e0bfb5751a87fc0f87a07", 0xa1, 0x8965}, {&(0x7f0000001a40)="0bb4593e98817c873c11ee30f097955a3cf49bf4755ef34cfca75e62b2da31b9e02a3ec76fb00a445226979ff1eb14420d90377d77e61de0d4bc93bbf1e6f2e0130fd8e79a125806f9204a44ef6ebd6e8fbff7b6e41a2dbc3524a80e668ec604e233a129591baaf0ce75c99d614bca77db1685887c36b94504c0943f1f251632a71690d39797698d996f308916d419f87cf945eeb1c08fba4e419d6dce6cae5a55682a84eb71122887e39db9fe03849c25d48843c2d0adad2822cc5cc081fce8e717d408b46f648d69e2cc", 0xcb, 0x100}, {&(0x7f0000000200)="5f8fca49546f5b932082c5844bd272d21305f7cd02c2b650d9", 0x19, 0x5}, {&(0x7f0000001480)="082621f81e7bb9ab441e4ea1444b83804fbc0e1b3c690116133b69e4503bf32767c3412e368976c8d9d31808a6ebf74dfaeefb90eeb2d51a28e024ae5d2400dc494fbe34736d471ca699184d3b757bfe4425c04ca8db48eb22837afb1de9b22f65ad2a17297148f8892497c1330633fa7c31d55edfda3de629ad", 0x7a, 0x40}, {&(0x7f0000001500)="8d3486f51cd32475d2a175cbd756c92869fcbb133fdc09103b3d7111c044f22c3bb1c14402cbe77172f99853769719de217c72222c3a7cd1710df40ac4b999ab8b6008baa60a5c6729ec73a0f095b94c5e625b8f2d615e3744a6966899409a", 0x5f, 0x6}, {&(0x7f0000000300)="1fa704ef4833663c15ea924d91404d6b2133779d", 0x14, 0x4}, {&(0x7f0000001580)="108bc98fb416861662a06f647eaf07ce64ad3f61dbee7387601984e50b01be19efda2b4beef7bb19944030f0753b2d3f806841196cb5a46e273a74bd2f9ef7ac3d498eb9a4032072ae8eece78c330e14a082784374f741980e34ef8210e702d9c4aeef148d164f85af77274ab1e135662917a1398f1f7ed4b6cffba9586f7ed2053d3defc15b66cbf8bdaa36b90014b2b3cc26e708e8678262d9f242be74a9fc268f770426cfea244a", 0xa9, 0x3}], 0x0, &(0x7f0000001740)={[{@mode={'mode', 0x3d, 0x3}}, {@check_strict='check=strict'}, {@gid={'gid', 0x3d, r3}}, {@map_off='map=off'}, {@nojoliet='nojoliet'}], [{@dont_hash='dont_hash'}, {@obj_role={'obj_role', 0x3d, '/proc/self/net/pfkey\x00'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@measure='measure'}]}) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) splice(r5, 0x0, r6, 0x0, 0x10005, 0x0) ioctl$UI_END_FF_ERASE(r5, 0x400c55cb, &(0x7f0000001800)={0x9, 0x15, 0x6}) 23:06:57 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="850000006d00000025000000000000009500000000000000afcd48d6494d614d1612ba392176dd2963228e1d69ba7ea94c500dc4ef2fad96ed406f21caf593836d9ea2cfb0e60436e054258c4686b066707de94a4f4d5fc79c987d669f2b1faca0f9d9924be41a9169bdfaf16d1c0b153911b8dd7f165789c691de6eee84309e7a23c19a39484809539fca4e0b6ec015a7d55545a34effa077faa55c59e88254f54077f799bf1683537a8ea0244d35b213bda80cc172afd80e361bedd8b8cc57255a5e3d77ac463920e231b7ae0da8616d2b7958f9005d822175ed60ab386d94af98af1da2b59525f8fe3b28d7e53c78fbfe5ab0255f347160ec8343e1494d3a63e57a15cf10453f6c0bb13b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0010f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f132a902e5111f2cc5e46ac1c60a9b10c074bfbcd4b09012175484135f0e519f0b1c4aaa026d570ecb5e8cddbed65ff76ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef479570c8ad943e392957b4f979ea17117a13201bafe4f0f6ea5a6c957ada0c548552b571bed5647223e78a99625bbca4fd91bc404ec13eaa66580ae7b813071cbb17d9f37282462f03de147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb5567e54d3504723177d356c4604b7a492ecec37e83efceefd7ca253cbc8edc8be05cc85451c6a14507434eb54b6f43caea5c4bf690441974b155f5adc6825a3a3d5b754df23175e2ce8b03bf3e3c033e54e4ba9b05292bfdb26f4cd7e166cc384b2845c537b397aaea0eac888419583ccaba598e6d8024920428e070ff941dd7067cb53879c3dbfa852e8fa7aa3d926c6d8aa1f82c76bc59352e82be8e52dce88f66bdb061681fc3b393f75eb23d5c6b4c0ac8ef660a37342f1d9a5d5c14b6b7e8611e5d311a20213ed6ac7b8d66fcc4b7454316338d928b8fff2739e811784d6873207c10ac73e264a6e65bf33020fc466df9ed2764ee2d076e5b68fa1642ebf17caf01bce8e02c31a13ceb7fed854b0625741964fdb2737505f8f584e4c14bd36b9e0608843fc32c6642091765068554ac92b42e467f69b499ecef34d2e6195365822b5577b3dd5f5c3424e7b6faea95c0109873eb52fb8e5a604c8adbf404a4dd79ce8c29f968f56dd583c3e9875678ca16f6b579cde0c1a0ab95f99620e84c0487e6565c04de458761768de308ff95a7189a7731378f0b171f99240f8167693329744d0e41639dca4859753d3"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:06:57 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') r0 = getuid() r1 = geteuid() setreuid(r1, 0x0) r2 = geteuid() setreuid(r2, 0x0) mount$9p_xen(&(0x7f0000000000)='syz\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1108406, &(0x7f0000000100)={'trans=xen,', {[{@dfltuid={'dfltuid', 0x3d, r0}}, {@fscache='fscache'}, {@access_uid={'access', 0x3d, r1}}, {@nodevmap='nodevmap'}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@obj_type={'obj_type', 0x3d, '/proc/self/net/pfkey\x00'}}]}}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCL_BLANKSCREEN(r4, 0x541c, &(0x7f00000001c0)) [ 444.414290][T16837] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:57 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 444.548959][T16842] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 444.617097][T16842] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:57 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="850000006d00000025000000000000009500000000000000afcd48d6494d614d1612ba392176dd2963228e1d69ba7ea94c500dc4ef2fad96ed406f21caf593836d9ea2cfb0e60436e054258c4686b066707de94a4f4d5fc79c987d669f2b1faca0f9d9924be41a9169bdfaf16d1c0b153911b8dd7f165789c691de6eee84309e7a23c19a39484809539fca4e0b6ec015a7d55545a34effa077faa55c59e88254f54077f799bf1683537a8ea0244d35b213bda80cc172afd80e361bedd8b8cc57255a5e3d77ac463920e231b7ae0da8616d2b7958f9005d822175ed60ab386d94af98af1da2b59525f8fe3b28d7e53c78fbfe5ab0255f347160ec8343e1494d3a63e57a15cf10453f6c0bb13b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0010f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f132a902e5111f2cc5e46ac1c60a9b10c074bfbcd4b09012175484135f0e519f0b1c4aaa026d570ecb5e8cddbed65ff76ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef479570c8ad943e392957b4f979ea17117a13201bafe4f0f6ea5a6c957ada0c548552b571bed5647223e78a99625bbca4fd91bc404ec13eaa66580ae7b813071cbb17d9f37282462f03de147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb5567e54d3504723177d356c4604b7a492ecec37e83efceefd7ca253cbc8edc8be05cc85451c6a14507434eb54b6f43caea5c4bf690441974b155f5adc6825a3a3d5b754df23175e2ce8b03bf3e3c033e54e4ba9b05292bfdb26f4cd7e166cc384b2845c537b397aaea0eac888419583ccaba598e6d8024920428e070ff941dd7067cb53879c3dbfa852e8fa7aa3d926c6d8aa1f82c76bc59352e82be8e52dce88f66bdb061681fc3b393f75eb23d5c6b4c0ac8ef660a37342f1d9a5d5c14b6b7e8611e5d311a20213ed6ac7b8d66fcc4b7454316338d928b8fff2739e811784d6873207c10ac73e264a6e65bf33020fc466df9ed2764ee2d076e5b68fa1642ebf17caf01bce8e02c31a13ceb7fed854b0625741964fdb2737505f8f584e4c14bd36b9e0608843fc32c6642091765068554ac92b42e467f69b499ecef34d2e6195365822b5577b3dd5f5c3424e7b6faea95c0109873eb52fb8e5a604c8adbf404a4dd79ce8c29f968f56dd583c3e9875678ca16f6b579cde0c1a0ab95f99620e84c0487e6565c04de458761768de308ff95a7189a7731378f0b171f99240f8167693329744d0e41639dca4859753d3"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:06:57 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='devtmpfs\x00', 0x1140024, &(0x7f0000000340)='/prt/pfkey\x00'/21) 23:06:57 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@md0='/dev/md0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x2100072, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:06:57 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:06:57 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2f6448874d99acbe14800d3486a8cf083b26463c2828762f6e627430d7"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x8, 0x80010, r0, 0xbe31a000) 23:06:57 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) flock(r1, 0x2) write$FUSE_POLL(r0, &(0x7f0000000140)={0x18, 0xfffffffffffffff5, 0x8, {0x80000000}}, 0x18) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x800, 0x0) getsockopt$inet_dccp_int(r2, 0x21, 0x10, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 23:06:57 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 445.148475][T16864] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:57 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x70004, &(0x7f0000000000)='/proc/self/net/pfkey\x00') 23:06:57 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f646576988d78093000"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000100)) link(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 23:06:57 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') pipe2$9p(&(0x7f0000000240), 0x4c00) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080)={0x3f, 0xff70, 0x8, 0x0, 0x55c2, 0xfffffff8, 0xfffffffe, 0x8}, &(0x7f00000000c0)=0x20) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:06:58 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:06:58 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='/dev\x00'], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:06:58 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f6465762f6e4264105d7ab866fcc2fa9246d5803bbc180567e3"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000100)='udf\x00', 0x4, 0x2) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000140)) 23:06:58 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) 23:06:58 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:06:58 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f6465762f6e620100000000000000"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') getsockopt$TIPC_CONN_TIMEOUT(0xffffffffffffffff, 0x10f, 0x82, &(0x7f0000000080), &(0x7f00000000c0)=0x4) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000100)=0x2, 0x4) [ 445.640570][T16886] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 445.709078][T16886] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:58 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U-', 0x100000001}, 0x16, 0x3) openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000380)={@val, @void, @ipv6=@icmpv6={0x4, 0x6, "96bffa", 0x2a8, 0x3a, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @mcast1, {[@routing={0x2c, 0x0, 0x5, 0x20}, @fragment={0x0, 0x0, 0x5, 0x1, 0x0, 0xb, 0x64}, @fragment={0x29, 0x0, 0x8, 0x1, 0x0, 0xe, 0x68}, @hopopts={0x2c, 0x2, [], [@ra={0x5, 0x2, 0x8}, @jumbo={0xc2, 0x4, 0x1}, @enc_lim={0x4, 0x1, 0x3}, @padn={0x1, 0x1, [0x0]}, @padn={0x1, 0x2, [0x0, 0x0]}]}, @routing={0x3c, 0x2, 0x1, 0x7, 0x0, [@mcast1]}], @param_prob={0x4, 0x2, 0x0, 0x9, {0x7, 0x6, 'ctp', 0x9, 0x119, 0x40, @ipv4={[], [], @empty}, @loopback, [@routing={0x3a, 0x8, 0x0, 0x80, 0x0, [@mcast2, @remote, @remote, @empty]}, @routing={0x2f, 0xa, 0x1, 0x9, 0x0, [@loopback, @remote, @mcast1, @empty, @rand_addr="2cdb850dc27edb89cd480b801ebe65e9"]}, @routing={0x89, 0x6, 0x1, 0x0, 0x0, [@mcast2, @dev={0xfe, 0x80, [], 0x21}, @rand_addr="c2ca49689c83982efe672f15e07b927e"]}, @dstopts={0x0, 0xf, [], [@enc_lim={0x4, 0x1, 0x3}, @generic={0x2, 0x26, "a8cc3c1f5977b179a5c2a773bfade325da25400d0d7f0f6f41f8ee1d3ef8719f5baae072992d"}, @calipso={0x7, 0x48, {0x1, 0x10, 0x2c, 0x813a, [0x5, 0x0, 0x7, 0x4d5, 0xa9cd, 0x9, 0x1, 0x7]}}, @enc_lim={0x4, 0x1, 0x7f}]}, @srh={0x87, 0xa, 0x4, 0x5, 0x3f, 0x28, 0xfffe, [@ipv4={[], [], @rand_addr=0x7}, @mcast1, @local, @empty, @loopback]}, @srh={0x5e, 0xe, 0x4, 0x7, 0x80, 0x0, 0x10, [@remote, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4={[], [], @broadcast}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}]}]}}}}}, 0x2d4) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffff, 0x6, 0x0, 0x3, 0x13, 0x1c, "2cb3a7faf6df9803a3d3c418fdb74d4f6c4f9166e71fae6314af8c3241383213779c3e46be5968e7ca023c148115924b2c0df98353130b2fae04fefe10d7971a", "37b7cd714edcd15f3a58594414c8e018a0344316f998937ecb77a5c10003176d1e0386161098ad79327a4225c983ce3a4ceb9f6cb3190d9b0fd78759749e8ec0", "cde5ae672465d7c8b00dc51b4999e795ee4deb4819b9807201daede2d3f64cef", [0x9, 0xffffffffffffdbcf]}) 23:06:58 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 445.867649][T16897] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:58 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) r0 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setflags(r0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_int(r2, 0x0, 0x14, &(0x7f0000000000), &(0x7f0000000080)=0x4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080), 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000300)={0x0, 0x10000, 0x20}, 0xc) vmsplice(0xffffffffffffffff, &(0x7f0000000140), 0x58, 0x4) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x8) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r3, 0x0, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="23e38ff2b5543b68ed1ab096425676e2c81a1000b9debf4d9f78f3a90a1749f7db861039fbcbe55d9b3e33edfa1e39de6a44500c9cd3d38b3cb190c74a593c1a54ae28f3334f1bb8fb454f2be8ca7f05689dd351b22cf70053d6f37acd7a10839beb4eb94f9f2349326d3692ec3e0469144409a4"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:06:58 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:06:59 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:06:59 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:06:59 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) open(&(0x7f0000000000)='./file0/file0\x00', 0x351800, 0x8) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:06:59 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) sendto(r0, &(0x7f0000000000)="96f63cc5fb6783cc94d5af8ab00786abbe", 0x11, 0x84, &(0x7f0000000080)=@generic={0x8, "acdc69d2203f5f4de74c57265790b150948cd38f82257a93d37281590cdedf7a5cac9d0ea3f5deb89a56fad32b965aa059e43347c92737b9018bf9374f9b8e31eab3067862fbd561f3523bd15a8b5ce95d399a6659b5826e1be7aea89e4d04bf0c1bc6d562e39b94cf85e629f7f157d0f09f0d7a786ccfddccd2e80848f4"}, 0x80) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) [ 446.745851][T16919] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:59 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 446.817550][T16921] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 446.919344][T16925] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:06:59 executing program 5: rt_sigprocmask(0x0, &(0x7f0000000000)={[0x80000000]}, &(0x7f0000000080), 0x8) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f6465762f6ebf363000"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video2\x00', 0x2, 0x0) 23:06:59 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:06:59 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x8000, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') [ 447.359345][T16934] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:00 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:00 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f0000000000)='binfmt_misc\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') ioctl$KVM_GET_ONE_REG(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000080)={0x100, 0x4}) [ 447.612283][T16939] binfmt_misc: Unknown parameter '/proc/self/net/pfkey' [ 447.669366][T16939] binfmt_misc: Unknown parameter '/proc/self/net/pfkey' 23:07:01 executing program 5: waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000140), 0x80000008, &(0x7f00000001c0)) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2f64bfc13465762f6e69e741447a474bf554e6b53226cfec9cd8cd2f3e9ce1c2b24317c505b4b0d48edf9b7ca2fb92693846c940e78c6d161e87d7bbf0bb71684a5fdb2413c7c740e935fc664519ff589675d5302c31860acf25cdeb6847932b38c5272f1bffd21dca089e398d0e30cfe18543a254dadc18e4e994de810de322c1e38deed4fc4d48839b528690be73a53deae6962c4b2f231a41"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') umount2(&(0x7f0000000000)='./file0\x00', 0xa) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000380)={0x8f6, {{0x2, 0x4e22, @remote}}}, 0x88) 23:07:01 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:01 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000080)=""/20) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r1, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="b8837ea1d98b38b6222350cb3781c19d66764c75b173a8732ca3d4e0500f8dfb4722f9623443a7647b1c06d9f020d356794195d4132d0d0c34ad6eb7ddf41416fc055b49455710bf23"], 0x5b) write$P9_RCREATE(r1, &(0x7f00000000c0)={0x18, 0x73, 0x2, {{0x4, 0x4, 0x4}, 0x5}}, 0x18) openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) truncate(&(0x7f0000000000)='./file0\x00', 0x8000) 23:07:01 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x18, &(0x7f0000000080)={r2}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000)={r2, 0x5}, 0x8) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') [ 449.276190][T16952] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:02 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 449.333827][T16952] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:02 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) [ 449.380129][T16957] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:02 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.upper\x00', &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x15, 0x2) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0xe) [ 449.458718][T16962] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:02 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r2, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x1000000c8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x6a, 0x30}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r3, 0x4) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:02 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, &(0x7f00000022c0)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 449.654860][T16967] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 449.715190][T16967] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:02 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) [ 449.835750][T16976] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:02 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, &(0x7f00000022c0)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 449.980550][T16979] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:02 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') r0 = msgget$private(0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x10005, 0x0) msgsnd(r0, &(0x7f0000000a00)=ANY=[@ANYRESHEX=r2], 0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000000080)=""/192) [ 450.033683][T16979] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 450.158958][T16986] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:02 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f642400008000000000"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) dup2(r1, r0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000380)={0x4, @win={{0x400, 0xf6, 0xe1ac, 0xfffff800}, 0x1, 0x80000000, &(0x7f00000000c0)={{0x1, 0x700, 0xe15d, 0x9}, &(0x7f0000000080)={{0x20, 0x5, 0x5, 0x9}}}, 0xd7f, &(0x7f0000000100)="07310dfe40426a2d2c7c1b01f518eb0706eca63a8ee2a8890081125b7f77ced0afd55b64d71b7b78bde4bad9fcd3ae1fce8257b2f74aa7f491a8a2d04007438fc45b4a728e1196e3402539d889d9bfa22a2de0de18b052fd354aca0f863b9a1769a75df8a3b2733e8a5c871b5f8536ae826206b522ac1ac2b34d483bf249afc5ecbb789dc9975ad45bfb718944db8cc52a9b2580d343e441123399d4c75704db934ab1fcb9a2", 0x9}}) 23:07:02 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, &(0x7f00000022c0)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 450.200857][T16986] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:03 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x801, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2e2f66696c65300050b767c7556096214d7c4962925181b96bc957d5cc33"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='virtiofs\x00', 0x1220801, &(0x7f0000000080)='/yroc\x05\x00eetey\x00\x00\x00\x00\x00\x00\x00\x00\x00U\xeb7\xe8\x86\x8b\xc8^\x8c\x93iJ<\x01w_\xce\xa3\xf2$?\v\xf3<\xa9\x11\x93\xc6\x11\xa5\xbcK\xde\xd0\x8e\x1e\xe5\r\xc5O\x1e\x9fp\xbe\x12\x9d\xf5\xb2c\xcc\xfd\xce\x84\xe7L*\xf0\xb3\x16\xe4E\xd9E)\xc4B\xa89aE\x10\xd36D\xe3\xadj\xbb\x04\"Vq\xc4\x8a\xa1t\x02\xbf\x18\xf0\x8d\xc0\xbc\x02\xea\xfb\xb0V\x19_\xa9PD\x9c\'Z(\xe8\xf0u\xce\x1c~*Dq\xd2:\xc5\x10\x11\xa1L\x9e9/\x86\xd9\x9e\xa9R\xf2\xdd\xf8\xcb\xce\xc9\xc6\x80\rUF\xfc\xe3wF\x90\xebM\xee\xe7\x8fh?\x93\x1f\xdb\xb8\x12\xea\xe9\xec\x11\x83\xba\xc6*\x12\xf3\xb2+\xc3\n9\x1e\xe8\x19\x13/\xa7SZ\xbc\x1fj\x11LTJ_\x88y\n\x00\xec\xe4\x83\x01\xf4\xe3\x03`\x17\xc0^\xe4N\x8eD\x8c\n\xda\xf9{\xd5\x00\x00') syz_mount_image$nfs(&(0x7f0000000000)='nfs\x00', &(0x7f00000003c0)='./file0\x00', 0x8001, 0x4, &(0x7f0000000740)=[{&(0x7f0000000400)="289d5dfa2e353720ea800f72385cb357e4759b4c8a3aa5d720e19d87284c0a4b8e80a666c4cb2636410177ab63a304b6b8d64695d89d4543fa87c094c48813665cab8a6e194228ec6fc9e9abc8e82df232988565c384e141d2f0c9c66f7065403608e5b722f69ea59a85165b37d195e06dc5974163c651ff3591c988b12243fde71f0eaa93cfe766ed222aa04375f067b7a98878c41404e6e6a065437711a31024e4c4e03712e8b2797c396d5fb618608cdc24f306a2e1c337ece18d2cf3d38d2154601bf669fe168435fec4cf0ff4563e87bc9c9e678f396e47589c0aff5b02eabbe307ec7afd47c7c2df62e2bfae2f5915a1ea40", 0xf5, 0x3f}, {&(0x7f0000000500)="59eeb5e8b025d7ef8f29e397a05866f1fb61d35d867e2b37a54f51bfbb87a74d1769981eb5d84569f47bcfe5f08899e4ecbc144cba09703c277a46011ddfbd8a0ea91aeeba46fcad2ffb1fd64dad9898", 0x50, 0x9}, {&(0x7f0000000580)="8a3b8c7c2e71d86e74637a1300c54badf8bce9c7d9f518cda5d7c451367b979358b103647b5a290a207b2ea0cc4452fc51981451769a6e0a7d903baa7dba4bc8578e21676833d82ca5049edb0f160984071304c015f833f6605374f6c5129f06693a85136906c3d4184b0b27684b3cd2e084590544e5ea68c8bf086b493d2536b306ddd8fe0530811d6531171e0b8e6ef0c6fa1951e380503ecab315e3a1e85a242ae60f2653e3df766784b83f0c75cb60055e30981723d698a002b21726e71d3c", 0xc1, 0x12b4f6f5}, {&(0x7f0000000680)="8d35c09ef6bb7a71dfd925b35f50fbb94f867d2da6ff16c94b2e521aea66a627dda38fd6a41a9c9c1adf9ed911024f603e1e6378e15b3b76b6a89cea728e3c7404740591f9ab260d8ca1aa3521cb48efaf4c508552cfdccb65601e64d7f16645f79d4062ba8ff305db27bdcd0fd63405e6611df04194929c120a5ef71ee3ece635ebd38ef044fdeb5013fbc0599837366074d9", 0x93, 0xd781}], 0x200080, &(0x7f00000007c0)='em0user-\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x10005, 0x0) setsockopt(r2, 0x3, 0x0, &(0x7f00000002c0)="473438078607054f0636675f100073b2db36bb65bee1d513afe9a998bf5e7fbabaedd1c2524009a582cc6ef8ac959a3d1ec3bf3a017b10ad8b618fad74576d800b42ff00da2e58cdb2e941d1e6a12eda2631279c60f0898967b994f3c6dc6f18dfdae277410df809db9ccc35de28e8c41bbc9cdfc17acf32bc4e563cc1e083d1d1525f6bdfe39c28b334cb5712f8e6045337b0e9c85f91047c94a7d689e5f7d3e01fa19d2d7853d13a1650a8c4613d37f7643a212a1080467ae4da0031bad83a1fcb84d4228d", 0xc6) r3 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_GET_MP_STATE(r3, 0x8004ae98, &(0x7f0000000200)) 23:07:03 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, &(0x7f00000022c0)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:03 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="01aa0700000000001d1a6a52b8a44935852adcd8b408e75004f9bfaf43c7d42d61a2e3982b4845a1e0bd08eed8992c2a54f24d0da043aa0adb80a51987458f2fd66bdd4a76c91e0d59388c92848d2483aa23f2097ec966517fa7a59b029000111e49ea5e9ab50cf02ab6abe0acb04d580356b98b5edf3e40c4b6b14ec53bd85a41643f11766e59a4b2225e6b0fb8218a"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') r0 = open(&(0x7f00000000c0)='./file0\x00', 0x400000, 0x1) openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$nl_rdma(0x10, 0x3, 0x14) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000200)={0x40000008}) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='system.advise\x00', &(0x7f0000000180)=""/65, 0x41) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') [ 450.497624][T17001] nfs: Unknown parameter 'em0user-' [ 450.556093][T17007] nfs: Unknown parameter 'em0user-' 23:07:03 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r0, 0xc0305616, &(0x7f0000000000)={0x0, {0x8f7c, 0x10000}}) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:03 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000000)='/proc/self/net/pfkey\x00\f\xac\xc6\xa7(z\xf4\xd1\xf5\x1e8\x01\x00\x00\x00\x01\x00\x00\x00\x1c\xda\xa0\x97\xcf\xa2r\xd7\xad\x9a~\xf3N\xee') [ 450.756200][T17016] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:03 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, &(0x7f00000022c0)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:03 executing program 3: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x400, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x10005, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) splice(r4, 0x0, r5, 0x0, 0x10005, 0x0) r6 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r7, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r7, &(0x7f0000000140)=ANY=[], 0x1000000c8) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000380)={0x100, 0x80000001, 0x6, 0x0, 0x0, [{{r2}, 0x8}, {{r5}, 0x401}, {{r0}, 0xffff}, {{r0}, 0x4}, {{r6}, 0x8}, {{r7}}]}) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000140)={&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f00000000c0)=""/126, 0x7e}) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) [ 450.866825][T17019] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 450.897288][T17020] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:03 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x8000, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:03 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, &(0x7f00000022c0)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 451.109308][T17030] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 451.138382][T17029] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:03 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f64656925042e1be9f7b6a743fef8176a60762f6e62643000"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:04 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3d, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:04 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000200)="3081a3", 0x1001, r0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000000)={r0, 0x1000, 0x3}, &(0x7f0000000080)={'enc=', 'oaep', ' hash=', {'blake2b-512-generic\x00'}}, &(0x7f0000000380)="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", &(0x7f0000000100)=""/3) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) keyctl$chown(0x4, r0, r1, r2) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') r3 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, &(0x7f0000000200)="3081a3", 0x1001, r3) r4 = geteuid() setreuid(r4, 0x0) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000001400)=ANY=[@ANYBLOB="0200000001000000000000001900000000000000080000889c3c9c4fe1a023", @ANYRES32=r6, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r6, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) keyctl$chown(0x4, r3, r4, r6) 23:07:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3000007, 0x110, r1, 0x8000000) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') [ 451.526117][T17042] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 451.564849][T17043] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 451.569557][T17042] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:04 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3d, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:04 executing program 5: mount(&(0x7f0000000180)=ANY=[@ANYBLOB="2f6407002f6e626430004163d94a54e11c53a67db5137d502ab100"/36], &(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x4040, &(0x7f0000000340)='/proc/self/net/pfkey\x00') lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=@random={'security.', '/proc/self/net/pfkey\x00'}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) syz_mount_image$jfs(&(0x7f0000000240)='jfs\x00', &(0x7f0000000280)='./file1\x00', 0xffffffffffffff00, 0x8, &(0x7f00000008c0)=[{&(0x7f0000000380)="3db959be21fe1155bb094c0bc0856ab06d2c50acfea4f073cfb68a8161e065fa3fd6576af2dd43dae1271da284c89822111bed7466d6ff5543031160e3f5a867ec8f51c45bbce29c36e56c1b6f79cbd13fbb4e3f9735cda0a44cf22c3aa15a43a6b65fbf6c1e439e189799f49fca0c7d5676214a2d007bca07aa08380db9dd541bc879f8a95acf35e96fc52f5320bb9dc2f8a18ba2671651407a0ad16c095787cbef8e434c7c9180edf1389f209ae95722b9834372cbed636b8922046abdd58fc63270fecca63c9d1e45c7417a62e1b3487ed0a7", 0xd4, 0x8}, {&(0x7f0000000480)="d9ba7d1f3d666d00b904b9738a4eaea421b26668e5aeda73412f07cf5b629ed5bffaee07718ae8290fe720507c2b9a50457415a46ef9a6391d6630559da5d2cc661b089b9bd84c7c9e33324f179301d4259128f710db7a2ed1e5a4a8c4596181df411af5e5ae0a0f23cd9e8c122d194f923944b9f0d2b42d73", 0x79}, {&(0x7f0000000500)="bacd87e91b834be40e03a404d05daaa24f75cadc00fb28e3db9aecdd283ea0bbf12557cdedffc56916185165d20d1a62645a8731531e92318272e814f7551499132aff2cdd6e15a51c470b1b721917d61458057bccfc87e833eb85ee9f56ebd6d44a", 0x62, 0x1000}, {&(0x7f0000000580)="f7e29ecf783ffade54bab3322cb51a54a513145bb5894e09985a42063b49efb883f641ca70f99ee545b74cbaae64924fa797efa75521d6c59bac5010e84af0bfa218d9b2c986efa9c478dc0eecc050bb8e08fdcc4a737c427e180d0f13a7aa7807f573857e8d428115556499e6f56d", 0x6f, 0x55e9}, {&(0x7f0000000600)="d0f139e2f6aa35ca51f7b1664c6b8f3f61a5b423d7562f933ae661c027ba19f7a92c734e71b900052e32a6224038385648d4f7e3b2f317d486e82c032fdac41cd75293d6b8dec6be4f5c423fb9be79de08ec39cfed17a6a8d51f7b465902ee1de370568d3f54844bddc230088df5d06b98bd553c5215abc0be0c4311b5b34921835c4754512f240736f0df769e56d9326ba94cb7d4ff3aff8da60886f8d83370822c2bd610ea898e83da8a09aa09a75a52e491ddb10609c4714c9bdc02f56c11a7dafdfbe123cf9588274775bcbf1dbe66d4535a16de220ea2fcb73344", 0xdd, 0x3}, {&(0x7f0000000700)="668d59ac4dc50ec5d55ef5c697deb6bf64f724eadbec5e390b62be7cc26553ebaee145574b8b8de4a6269457b8443269eac506986826b6ac5554dc19278bb59b4427d25b2e8b2bd5d5cc28129ee349d97fc756a6d8fa98c12bdbd311a3c4732b16020baad65b0dbd2c27eba0960524787a60a21f20d13c835aafa328e9180f066e7a2ad4c224b2b48a12f3c1d210e3fe38897969e63f7dfe8f761153b77ccb58e057e5096b605bb8db91b444496637e2402e5863a7f2e105cd", 0xb9, 0x100000000}, {&(0x7f0000000300)="d1471aef0b630d292b5202b4af9ebe25e2dfa21cedb408d6e61670f700d9e9cc7823db4760f4e27ec269988f0ee980cfc325805ffb91d197b4", 0x39, 0xffffffff80000001}, {&(0x7f00000007c0)="1a3bb111987fecbed702280d0ba16d08024e5dcf6eb838ccd228a677e8ed65b44ce6fd1e501a0a3671c9e53a557934fea1ad63aa42d3e567a08f23288ddedf4a31aca65619cdb928144b0656d32fd02778ffa81854e43622b18af45286bcca2c5688db43413038aa89b9e1e61e9ff217089bcb6cd405bc91d0e81a23b02bf316d13888efe9ee04ce9e3ce65d9e0d65ba23e5d96ea3099ced455f55b7398fa79b8d61bd36c7cd5a28ae5f7e4bf72b6cf197648b93a0ae8b97dc3df0c006eda7bfea319bc3474a4cc631a4ad7cafe2a76795356466fb460fc25941eef24370", 0xde, 0xbee}], 0x14057, &(0x7f0000000980)={[{@integrity='integrity'}, {@errors_continue='errors=continue'}, {@resize='resize'}, {@errors_remount='errors=remount-ro'}, {@integrity='integrity'}, {@errors_continue='errors=continue'}, {@iocharset={'iocharset', 0x3d, 'cp861'}}], [{@smackfshat={'smackfshat', 0x3d, 'eth0\'\'.'}}, {@subj_type={'subj_type'}}, {@subj_role={'subj_role', 0x3d, 'md5sum'}}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@obj_role={'obj_role', 0x3d, '{'}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r2, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x1000000c8) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000a80)={0x0, &(0x7f0000000a40)}) statx(r1, &(0x7f00000001c0)='./file0\x00', 0x2000, 0x200, &(0x7f0000000080)) 23:07:04 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3d, &(0x7f00000022c0)=ANY=[@ANYBLOB="850000006d00000025000000000000009500000000000000afcd48d6494d614d1612ba392176dd2963228e1d69ba7ea94c500dc4ef2fad96ed406f21caf593836d9ea2cfb0e60436e054258c4686b066707de94a4f4d5fc79c987d669f2b1faca0f9d9924be41a9169bdfaf16d1c0b153911b8dd7f165789c691de6eee84309e7a23c19a39484809539fca4e0b6ec015a7d55545a34effa077faa55c59e88254f54077f799bf1683537a8ea0244d35b213bda80cc172afd80e361bedd8b8cc57255a5e3d77ac463920e231b7ae0da8616d2b7958f9005d822175ed60ab386d94af98af1da2b59525f8fe3b28d7e53c78fbfe5ab0255f347160ec8343e1494d3a63e57a15cf10453f6c0bb13b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0010f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f132a902e5111f2cc5e46ac1c60a9b10c074bfbcd4b09012175484135f0e519f0b1c4aaa026d570ecb5e8cddbed65ff76ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef479570c8ad943e392957b4f979ea17117a13201bafe4f0f6ea5a6c957ada0c548552b571bed5647223e78a99625bbca4fd91bc404ec13eaa66580ae7b8130"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 451.882481][T17054] jfs: Unrecognized mount option "smackfshat=eth0''." or missing value 23:07:04 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) r1 = geteuid() setreuid(r1, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r3, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) fchown(r0, r1, r3) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000000)=@ccm_128={{0x304}, "e1f6d01cc4c3c54c", "8d95c8fca056b2ce6641ff2fdb17155b", "30b6dd13", "3b2ebe2e5ef5f843"}, 0x28) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='/dev/nbb-\x00'], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:04 executing program 3: mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0x80, 0x1) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x2000, 0x0) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000080)=0x3) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) 23:07:04 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x5c, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:04 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, &(0x7f0000000000)={0xffffff02, 0x4745504a, 0x1000, 0x83d5, 0x1, @discrete={0x3, 0x2}}) 23:07:05 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x5c, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 452.418385][T17073] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 452.477899][T17073] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:05 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=ANY=[@ANYBLOB=',d\f0\x00'], &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='squashfs\x00', 0x211023, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) 23:07:05 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x5c, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:05 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvme-fabrics\x00', 0x8000, 0x0) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xfffffffffffffffd, 0x325b80) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="be5abaf5272162643000"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:05 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000000)=[0x2, 0x80], 0x2, 0x4, 0x401, 0x830, 0x3, 0xfffffff9, 0xff, {0x1f, 0x4, 0x3f, 0x0, 0x4fa2, 0x5, 0x9, 0x2, 0x7fff, 0x4, 0x1000, 0x1a0, 0x0, 0x2, "cf683fb102503989d18b514ec9033cde0080ed0f937ce20989db907af4bcd5b6"}}) openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) 23:07:05 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x2, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=@newlink={0x38, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN={0x10, 0x2, {0xffff100f}}]}]}]}, 0x38}}, 0x0) sendmsg$sock(r0, &(0x7f0000000200)={&(0x7f0000000080)=@ll={0x11, 0x11, r3, 0x1, 0x9, 0x6, @multicast}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000100)="173d6d74680d115277a04127410d5523d1a0c218428581206b4b7e23de9d946801799cae2a9043fe0a3102a052e73c9926976c7b24022c1218b0bf676d742e3c68c80d04680e24b7b0842ce7687101b7d7981104b257d0f76217623c570f2a6dc3dd42b0072f5ed797a9db87f742a805e04bb814762d3e65cfff27076e57feabd550e6d55af379c8f34a7a551e7dac9c71f9b8e6a7ee24e9bf1c9fc9dfe530cfa24f2d0fb1d7089791e661181047f14582044ecd12880dec", 0xb8}], 0x1, &(0x7f0000000380)=[@timestamping={{0x14, 0x1, 0x25, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x800}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}], 0x48}, 0x90) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:05 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x400, 0x1) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f0000000080)=""/149) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:05 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x6b, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 452.972834][T17089] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 453.046326][T17089] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:05 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x6b, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 453.249476][T17097] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:06 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='/dev \x00\x00\x00\x00\x00'], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x18, &(0x7f0000000080)={r4}, 0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000000)={r4, 0x9}, &(0x7f0000000080)=0x8) openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) 23:07:06 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x6b, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:06 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=""/131, 0x83) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) sendmsg$inet6(r3, &(0x7f0000000740)={&(0x7f0000000200)={0xa, 0x4e21, 0x7, @rand_addr="e9ab4e0977255d837f309db8c42e9430", 0x4}, 0x1c, &(0x7f0000000580)=[{&(0x7f0000000380)="dcf722951edd1cad673b871e8beb4d23912161de6f6098f5d46dd79fcf0cfd9c0d7338438451fc14a788f35e921955e91f97b46e3f8c955be17f33decacaa436078c2229d5cf428878764004eadc9e64148ad6564730369fb81e9bdca4b92bec44bb4081117755163e9859f24dce94c68779ba", 0x73}, {&(0x7f0000000400)="52f31806f3dead4ce861190da91e58aa12b0dd9f958a539a2e778c7403c9d15b5be0bfa219c2181005d2c04143d562309c71407cec93cf6e6792101e2a844f9127a92a2d0e902f8ccf3dc0f73776207d4408d82bca8c920de5fda87e8bc4aca8b6af", 0x62}, {&(0x7f0000000300)="57205cdfa5", 0x5}, {&(0x7f0000000480)="c66eac9fd811b611858a640d3f2f0250c3c7e4a3e225aba4308a8941024f77b638641c622a8b00f4a88d6a74d90f765ac7a51be038be3c5fd934b3c9ed0451574f7737bb247f49821f5f957550f7de4819b480e38fa0838db8e18f35445362a6f8760c87d7f5146fc33a4a560f94c7e2a8eca4229bfb2487dba919532017", 0x7e}, {&(0x7f0000000500)}, {&(0x7f0000000540)="7d66fcc846fdc56c451d16552bd2965858d19373bbc6e3a75f66", 0x1a}], 0x6, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x108}, 0x4) close(r2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000007c0)={0x9c0000, 0x50, 0x7, 0xffffffffffffffff, 0x0, &(0x7f0000000780)={0x9b0905, 0x7fff, [], @ptr=0x91}}) renameat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', r5, &(0x7f0000000800)='./file0\x00') splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000980)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000700)={&(0x7f0000000640)=ANY=[@ANYBLOB="b4000000000203000000000000000000020000070900060073797a300000000006000740000100007c000180060003400001000006000340000000003900018014000300fe8000000000000000000000000000aa14000400fe8000000000000000000000000000bb060003400001000014000180080001000000000008000200ffffffff060003400000000006000340000200000600034000020000060003400002000008000440000000070600074000040000"], 0xb4}, 0x1, 0x0, 0x0, 0x8800}, 0x1) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r6, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0x1000000c8) getsockopt$inet_dccp_int(r6, 0x21, 0xa, &(0x7f00000009c0), &(0x7f0000000a00)=0x4) accept(r4, &(0x7f0000000140)=@l2={0x1f, 0x0, @fixed}, &(0x7f00000001c0)=0x80) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000a40)={0xffffffffffffffff, 0x80}) 23:07:06 executing program 3: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0x1) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x10000, &(0x7f0000000000)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) [ 453.655181][T17111] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:06 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x73, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:06 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:06 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x73, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 453.910141][T17123] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:06 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) r0 = geteuid() setreuid(r0, 0x0) r1 = geteuid() setreuid(r1, 0x0) r2 = geteuid() setreuid(r2, 0x0) r3 = getegid() r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r5, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r5, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) r6 = getegid() r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r8, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r10, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r10, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x3}, [{}, {}, {0x2, 0x5}, {0x2, 0x4}, {0x2, 0x2, r0}, {0x2, 0x5, r1}, {0x2, 0x2, r2}], {0x4, 0x1}, [{0x8, 0x7, r3}, {0x8, 0x1, r5}, {0x8, 0x4, r6}, {0x8, 0x2, r8}, {0x8, 0x6, r10}], {0x10, 0x2}, {0x20, 0x6}}, 0x84, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f64658f2f6e62643000"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:06 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x73, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:07 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000080)='/\x13\x9f\xa4?M|\xb1\xd4+]RX\x9fR\x8c\x87proc/seln/ne\xe75EY\x81\xe6h\xb9\xc8\\\x17eR\xc9\xa8R\x1d\xfa\xa2\xb8\xb7\xd6vq\xabuW\xde\xf1m7\x0e\xf9\a\x06(\x13\xa4\xc6\xd1{\x86?\x80g\xe0n\xf0_\xea+]\xab#\xd2`um\xba|n\x02\x0f\xd7@\x13\xb3Jh\x01\xe2\xda\xbf\xc5\x1b\xdd\x888\xdf\xf1\x9b0,\xe9\xca\xf8pwJ\x01S\xe8\x9d\x8f\xaa\x1d\xa7') 23:07:07 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x77, &(0x7f00000022c0)=ANY=[@ANYBLOB="850000006d00000025000000000000009500000000000000afcd48d6494d614d1612ba392176dd2963228e1d69ba7ea94c500dc4ef2fad96ed406f21caf593836d9ea2cfb0e60436e054258c4686b066707de94a4f4d5fc79c987d669f2b1faca0f9d9924be41a9169bdfaf16d1c0b153911b8dd7f165789c691de6eee84309e7a23c19a39484809539fca4e0b6ec015a7d55545a34effa077faa55c59e88254f54077f799bf1683537a8ea0244d35b213bda80cc172afd80e361bedd8b8cc57255a5e3d77ac463920e231b7ae0da8616d2b7958f9005d822175ed60ab386d94af98af1da2b59525f8fe3b28d7e53c78fbfe5ab0255f347160ec8343e1494d3a63e57a15cf10453f6c0bb13b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0010f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f132a902e5111f2cc5e46ac1c60a9b10c074bfbcd4b09012175484135f0e519f0b1c4aaa026d570ecb5e8cddbed65ff76ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef479570c8ad943e392957b4f979ea17117a13201bafe4f0f6ea5a6c957ada0c548552b571bed5647223e78a99625bbca4fd91bc404ec13eaa66580ae7b813071cbb17d9f37282462f03de147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb5567e54d3504723177d356c4604b7a492ecec37e83efceefd7ca253cbc8edc8be05cc85451c6a14507434eb54b6f43caea5c4bf690441974b155f5adc6825a3a3d5b754df23175e2ce8b03bf3e3c033e54e4ba9b05292bfdb26f4cd7e166cc384b2845c537b397aaea0eac888419583ccaba598e6d8024920428e070ff941dd7067cb53879c3dbfa852e8fa7aa3d926c6d8aa1f82c76bc59352e82be8e52dce88f66bdb061681fc3b393f75eb23d5c6b4c0ac8ef660a37342f1d9a5d5c14b6b7e8611e5d311a20213ed6ac7b8d66fcc4b7454316338d928b8fff2739e811784d6873207c10ac73e264a6e65bf33020fc466df9ed2764ee2d076e5b68fa1642ebf17caf01bce8e02c31a13ceb7fed854b0625741964fdb2737505f8f584e4c14bd36b9e0608843fc32c6642091765068554ac92b42e467f69b499ecef34d2e6195365822b5577b3dd5f5c3424e7b6faea95c0109873eb52fb8e5a604c8adbf404a4dd79ce8c29f968f56dd583c3e9875678ca16f6b579cde0c1a0ab95f99620e84c0487e6565c04de458761768de308ff9"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 454.453052][T17141] UDF-fs: bad mount option "/Ÿ¤?M|±Ô+]RXŸRŒ‡proc/seln/neç5EYæh¹È\eRɨRú¢¸·Övq«uWÞñm7ù(¤ÆÑ{†?€gànð_ê+]«#Ò`umº|n×@³JhâÚ¿Å݈8ßñ›0" or missing value 23:07:07 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="1c617c762fef6e78fefe531c4eb468f8eb3c73a4ad05cb7cc8d5db83bdd30924094dfeca8339f9186580bfe2947644fe67e7f0c1fa5b6a60040a17340cb353764d9687f7ecc995d57097d7fbbc"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:07 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x77, &(0x7f00000022c0)=ANY=[@ANYBLOB="850000006d00000025000000000000009500000000000000afcd48d6494d614d1612ba392176dd2963228e1d69ba7ea94c500dc4ef2fad96ed406f21caf593836d9ea2cfb0e60436e054258c4686b066707de94a4f4d5fc79c987d669f2b1faca0f9d9924be41a9169bdfaf16d1c0b153911b8dd7f165789c691de6eee84309e7a23c19a39484809539fca4e0b6ec015a7d55545a34effa077faa55c59e88254f54077f799bf1683537a8ea0244d35b213bda80cc172afd80e361bedd8b8cc57255a5e3d77ac463920e231b7ae0da8616d2b7958f9005d822175ed60ab386d94af98af1da2b59525f8fe3b28d7e53c78fbfe5ab0255f347160ec8343e1494d3a63e57a15cf10453f6c0bb13b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0010f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f132a902e5111f2cc5e46ac1c60a9b10c074bfbcd4b09012175484135f0e519f0b1c4aaa026d570ecb5e8cddbed65ff76ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef479570c8ad943e392957b4f979ea17117a13201bafe4f0f6ea5a6c957ada0c548552b571bed5647223e78a99625bbca4fd91bc404ec13eaa66580ae7b813071cbb17d9f37282462f03de147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb5567e54d3504723177d356c4604b7a492ecec37e83efceefd7ca253cbc8edc8be05cc85451c6a14507434eb54b6f43caea5c4bf690441974b155f5adc6825a3a3d5b754df23175e2ce8b03bf3e3c033e54e4ba9b05292bfdb26f4cd7e166cc384b2845c537b397aaea0eac888419583ccaba598e6d8024920428e070ff941dd7067cb53879c3dbfa852e8fa7aa3d926c6d8aa1f82c76bc59352e82be8e52dce88f66bdb061681fc3b393f75eb23d5c6b4c0ac8ef660a37342f1d9a5d5c14b6b7e8611e5d311a20213ed6ac7b8d66fcc4b7454316338d928b8fff2739e811784d6873207c10ac73e264a6e65bf33020fc466df9ed2764ee2d076e5b68fa1642ebf17caf01bce8e02c31a13ceb7fed854b0625741964fdb2737505f8f584e4c14bd36b9e0608843fc32c6642091765068554ac92b42e467f69b499ecef34d2e6195365822b5577b3dd5f5c3424e7b6faea95c0109873eb52fb8e5a604c8adbf404a4dd79ce8c29f968f56dd583c3e9875678ca16f6b579cde0c1a0ab95f99620e84c0487e6565c04de458761768de308ff9"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:07 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$setpipe(r1, 0x407, 0xfc1) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2f6465762f6e6264300078b8f254aa976fac1b2066e799f86fa16a465b00e86da3d8b76b50e9e37322c1fd9b543c6579bbe686ff66b24f0323e737ff3588f0a11699f8e4dcf2dff6208f83ea14e3a542e4c5d2e1c6e1e524580bc8360ae436a92d072825a0a8648f22fd1ecf192de68ce21921c7ad3a7b0fde5d6912f163f09b39c1"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:07 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x77, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 454.977548][T17151] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:07 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:07 executing program 3: mount(&(0x7f0000000240)=ANY=[@ANYBLOB='/gev/nbd0\x00'], &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x800, &(0x7f0000000000)='/pr\x8bc/self/net/p\xb4\x01\x00\x00\x00\x00\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dri/renderD128\x00', 0x65c140, 0x0) acct(&(0x7f0000000200)='./file0\x00') ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000004fc8)={0x0, 0xfffffffffffffed4, &(0x7f000000b000)={&(0x7f000002c000)=@mpls_newroute={0x24, 0x18, 0x21, 0x0, 0x0, {0x1c, 0x14, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1}, [@RTA_TTL_PROPAGATE={0x8, 0x12, 0xa}]}, 0x24}}, 0x0) r4 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000340)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTDEF(r3, &(0x7f00000004c0)={&(0x7f00000002c0), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)={0x44, r4, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_DOMAIN={0x15, 0x1, '/proc/partitions\x00'}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x29}]}, 0x44}, 0x1, 0x0, 0x0, 0x20040050}, 0x4081) sendmsg$NLBL_MGMT_C_REMOVEDEF(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r4, 0x10, 0x70bd26, 0x25dfdbff, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @remote}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x48810}, 0x400a094) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f00000000c0)) 23:07:07 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x79, &(0x7f00000022c0)=ANY=[@ANYBLOB="850000006d00000025000000000000009500000000000000afcd48d6494d614d1612ba392176dd2963228e1d69ba7ea94c500dc4ef2fad96ed406f21caf593836d9ea2cfb0e60436e054258c4686b066707de94a4f4d5fc79c987d669f2b1faca0f9d9924be41a9169bdfaf16d1c0b153911b8dd7f165789c691de6eee84309e7a23c19a39484809539fca4e0b6ec015a7d55545a34effa077faa55c59e88254f54077f799bf1683537a8ea0244d35b213bda80cc172afd80e361bedd8b8cc57255a5e3d77ac463920e231b7ae0da8616d2b7958f9005d822175ed60ab386d94af98af1da2b59525f8fe3b28d7e53c78fbfe5ab0255f347160ec8343e1494d3a63e57a15cf10453f6c0bb13b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0010f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f132a902e5111f2cc5e46ac1c60a9b10c074bfbcd4b09012175484135f0e519f0b1c4aaa026d570ecb5e8cddbed65ff76ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef479570c8ad943e392957b4f979ea17117a13201bafe4f0f6ea5a6c957ada0c548552b571bed5647223e78a99625bbca4fd91bc404ec13eaa66580ae7b813071cbb17d9f37282462f03de147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb5567e54d3504723177d356c4604b7a492ecec37e83efceefd7ca253cbc8edc8be05cc85451c6a14507434eb54b6f43caea5c4bf690441974b155f5adc6825a3a3d5b754df23175e2ce8b03bf3e3c033e54e4ba9b05292bfdb26f4cd7e166cc384b2845c537b397aaea0eac888419583ccaba598e6d8024920428e070ff941dd7067cb53879c3dbfa852e8fa7aa3d926c6d8aa1f82c76bc59352e82be8e52dce88f66bdb061681fc3b393f75eb23d5c6b4c0ac8ef660a37342f1d9a5d5c14b6b7e8611e5d311a20213ed6ac7b8d66fcc4b7454316338d928b8fff2739e811784d6873207c10ac73e264a6e65bf33020fc466df9ed2764ee2d076e5b68fa1642ebf17caf01bce8e02c31a13ceb7fed854b0625741964fdb2737505f8f584e4c14bd36b9e0608843fc32c6642091765068554ac92b42e467f69b499ecef34d2e6195365822b5577b3dd5f5c3424e7b6faea95c0109873eb52fb8e5a604c8adbf404a4dd79ce8c29f968f56dd583c3e9875678ca16f6b579cde0c1a0ab95f99620e84c0487e6565c04de458761768de308ff95a7189a7731378f0b171f99240f816"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:08 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0xa2200, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000080)={0x8001004, 0x81}) 23:07:08 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x79, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:08 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) sendmsg$kcm(r2, &(0x7f00000058c0)={&(0x7f00000053c0)=@xdp={0x2c, 0xd, r4}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005440)="cf2ae02656b6f168811d35c075d6580d2d0c92dd", 0x14}, {&(0x7f0000005480)="efeb5898abda3b9ad5034b78bf0f6294d433b1139ea768a90a2ce826c08f31e371f50e8ac43210d8aaae9d2667ed6c6b3179c04f57411657d9118dafbfacb1f9e611556311c685214089ab7566ebd0230bf061f4488a3e7c9b158e5a65c75b95e992e1c5dc6c45bf2e58efb022d8217b552293c41e9247496cefd26a556d39af59d5c90f5eb371518f3462ee2e73cbb23c35eaf72270e74218b89cf4f66866effb37af0f7cc2684fd62865ee099c03490a99f5a941cb2d362647eacc09905072680ab894", 0xc4}, {&(0x7f0000005580)="18cd42f433c5716326976c4f64bd6ed430e578ce237938c75fb96107495b449493a0006579ffd61579f6c102883431c4dfff23847013dbc493e40a3cc0ac4e79de38a8ebc42b5bb74b8607cad09f676a04e5afefd7857ca6048a7320e305e7cb3aa201b5e63786b641bf83ec85acb7626fae4f5c9702244213c8b85e3b", 0x7d}, {&(0x7f0000005600)}], 0x4, &(0x7f00000056c0)=[{0x10, 0x1, 0x3}, {0x10, 0x107, 0x1000}], 0x20}, 0x4811) socket$kcm(0x29, 0x7, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r5) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='threaded\x00', 0x9) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r3, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r6, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 455.497369][T17165] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 455.553122][T17165] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:08 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x79, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:08 executing program 3: mknod$loop(&(0x7f0000000140)='./file0\x00', 0xc000, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_RES_CM_ID_GET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000000b1400012dbd7000fbdbdf2508003f004800e6ff"], 0x18}, 0x1, 0x0, 0x0, 0x4000}, 0xc005) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x10005, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r2, 0x80184153, &(0x7f0000000680)={0x0, &(0x7f0000000300)=[&(0x7f0000000380)="1776d2a85885574ab93a108f8d9b5bd25055818bbe60c486b303551a8fe8f55a526abfe64d6b7763337ba796bab39d94570e95c054f8f674b97cd0a8af755c85b79e6472145f66e39d58717c874f8788ee3f40c7d0775774e374ad9028f2b59964f77fc4d309f50f3e03a154a449fa18c1700825ddce7522771f493eab675e388b07e1a3d78dbe52473fbb0282a5fd30dea8f7b0d19b26effc3f5631cde41d185043a6df31f783831dd8eb183bb9b7f8fe5dc1dc277e19fb23821836fafc7f104529cebe12d04d462809f6b80f0f54619a42d9b2d966c5d426fce454588d613e2016117b5424435612524bb92ca2e76d4a55", &(0x7f0000000180)="5014c8fb4eeaf6649dc4427e6ee1c7ceec923ab202c8b2796186273a99ccb78d9e6903df6eeffffeb025183e41da61f5b032582e43427d6c110d65b8b0822fd9a008f8c794e41785512200f561110dd24d1f42a9081109d9e504f2e9bcc0fd4b2b35b639df5d862db47b8f1de4083ec315e4628afe56362ec0ffc96ebb1ce720e9c02c95f05a3474c6928cc28b6f6342d624bfd9fe91ac345d1c3085a57187aa68b4fd7b3d69899c6d2a04d0f0982677fcba", &(0x7f0000000480)="9ed40e557846fc36246518c7bc5528f1853ca58386aad995a9e7bdc333b7c92361974ab9c08de8a08db9f20ec54e78cfa3d546f7868a289dd67c99c6e2ce11bb658ed6eda9437235e5803a8ab5712d3470a90f133a1faae9313964de0d60", &(0x7f0000000040), &(0x7f0000000500)="5479d29dded62718500c4f2183c1b4466b6190589a035f73d150bb1423404df239f4109eaa88ddd9dbefe8e674c37e0ec310f1d48f2f88ebf7e0fe4025f3306366ee0b7928d528df466123c9533f025dd81c69bb651983a376eff0496fea228887cce59e70c79e889b", &(0x7f0000000580)="18e51e231a52342da26a53974cf3a73c8714e8125bea9b574bc45c394add3ba9a7402190e3d3cfe91885e7104b5156edb9f1d823f6194311b8689ecf709dae8eeec6c6c3eedc3e7cfbf86e0ed7fb58ca452a869f9b481be1ba86b633e5aad613620cfea9f24b95ca446446b1600c8e33d2267b44276432204ea817c0b6df0d67ed3373f306fa8619151777bd0ed34a184dac63c70b387d6bc659b77dd930e2a3027f31b27999a2a15bf1a6745e781546da92d008a806a4690a74692447f74da0687bceae305a0a2119fead2030ee4234a0a065657b0d65025f427f9db3f32ee9"]}) openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) [ 455.966461][T17175] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 456.000048][T17175] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:08 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x7a, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:08 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) sendmsg$kcm(r2, &(0x7f00000058c0)={&(0x7f00000053c0)=@xdp={0x2c, 0xd, r4}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005440)="cf2ae02656b6f168811d35c075d6580d2d0c92dd", 0x14}, {&(0x7f0000005480)="efeb5898abda3b9ad5034b78bf0f6294d433b1139ea768a90a2ce826c08f31e371f50e8ac43210d8aaae9d2667ed6c6b3179c04f57411657d9118dafbfacb1f9e611556311c685214089ab7566ebd0230bf061f4488a3e7c9b158e5a65c75b95e992e1c5dc6c45bf2e58efb022d8217b552293c41e9247496cefd26a556d39af59d5c90f5eb371518f3462ee2e73cbb23c35eaf72270e74218b89cf4f66866effb37af0f7cc2684fd62865ee099c03490a99f5a941cb2d362647eacc09905072680ab894", 0xc4}, {&(0x7f0000005580)="18cd42f433c5716326976c4f64bd6ed430e578ce237938c75fb96107495b449493a0006579ffd61579f6c102883431c4dfff23847013dbc493e40a3cc0ac4e79de38a8ebc42b5bb74b8607cad09f676a04e5afefd7857ca6048a7320e305e7cb3aa201b5e63786b641bf83ec85acb7626fae4f5c9702244213c8b85e3b", 0x7d}, {&(0x7f0000005600)}], 0x4, &(0x7f00000056c0)=[{0x10, 0x1, 0x3}, {0x10, 0x107, 0x1000}], 0x20}, 0x4811) socket$kcm(0x29, 0x7, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r5) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='threaded\x00', 0x9) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r3, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r6, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:08 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x18, &(0x7f0000000080)={r3}, 0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={r3, 0xffff}, &(0x7f0000000080)=0x8) 23:07:09 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x7a, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 456.428756][T17187] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:09 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x7a, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:09 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) sendmsg$kcm(r2, &(0x7f00000058c0)={&(0x7f00000053c0)=@xdp={0x2c, 0xd, r4}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005440)="cf2ae02656b6f168811d35c075d6580d2d0c92dd", 0x14}, {&(0x7f0000005480)="efeb5898abda3b9ad5034b78bf0f6294d433b1139ea768a90a2ce826c08f31e371f50e8ac43210d8aaae9d2667ed6c6b3179c04f57411657d9118dafbfacb1f9e611556311c685214089ab7566ebd0230bf061f4488a3e7c9b158e5a65c75b95e992e1c5dc6c45bf2e58efb022d8217b552293c41e9247496cefd26a556d39af59d5c90f5eb371518f3462ee2e73cbb23c35eaf72270e74218b89cf4f66866effb37af0f7cc2684fd62865ee099c03490a99f5a941cb2d362647eacc09905072680ab894", 0xc4}, {&(0x7f0000005580)="18cd42f433c5716326976c4f64bd6ed430e578ce237938c75fb96107495b449493a0006579ffd61579f6c102883431c4dfff23847013dbc493e40a3cc0ac4e79de38a8ebc42b5bb74b8607cad09f676a04e5afefd7857ca6048a7320e305e7cb3aa201b5e63786b641bf83ec85acb7626fae4f5c9702244213c8b85e3b", 0x7d}, {&(0x7f0000005600)}], 0x4, &(0x7f00000056c0)=[{0x10, 0x1, 0x3}, {0x10, 0x107, 0x1000}], 0x20}, 0x4811) socket$kcm(0x29, 0x7, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r5) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='threaded\x00', 0x9) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r3, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r6, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:09 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x7a, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:10 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="6164300081988c5fb7fa152f82c8f2d632140dbbd17a4ba82d41ab9bc54cda228170a8f5af4ddf865839bd8372882d6aa65788158f0984d04119af194acc2be3929cd02e739178784f128251760de5c638cea3783524750ae74a9c68a570bfdedee3f2e9a531a4fe5095ca066e7172f10fe0"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$capi20_data(r1, &(0x7f0000000180)={{0x10, 0x7ff, 0x80, 0x83, 0x100, 0x8000}, 0x56, "537775e295534ac2d2eac9acada96feeeca1b4605a7e8871724eccf2be7e213e8012ea9f79e8c574870444a1dacb0bc19af7457a3960db2b11f745ff1601d737301948a5f8e6658449e9bdf7896f4f0404e005b44ab2"}, 0x68) openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) 23:07:10 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x7a, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:10 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f6402002f6e62643000"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) 23:07:10 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x7a, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:10 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) sendmsg$kcm(r2, &(0x7f00000058c0)={&(0x7f00000053c0)=@xdp={0x2c, 0xd, r4}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005440)="cf2ae02656b6f168811d35c075d6580d2d0c92dd", 0x14}, {&(0x7f0000005480)="efeb5898abda3b9ad5034b78bf0f6294d433b1139ea768a90a2ce826c08f31e371f50e8ac43210d8aaae9d2667ed6c6b3179c04f57411657d9118dafbfacb1f9e611556311c685214089ab7566ebd0230bf061f4488a3e7c9b158e5a65c75b95e992e1c5dc6c45bf2e58efb022d8217b552293c41e9247496cefd26a556d39af59d5c90f5eb371518f3462ee2e73cbb23c35eaf72270e74218b89cf4f66866effb37af0f7cc2684fd62865ee099c03490a99f5a941cb2d362647eacc09905072680ab894", 0xc4}, {&(0x7f0000005580)="18cd42f433c5716326976c4f64bd6ed430e578ce237938c75fb96107495b449493a0006579ffd61579f6c102883431c4dfff23847013dbc493e40a3cc0ac4e79de38a8ebc42b5bb74b8607cad09f676a04e5afefd7857ca6048a7320e305e7cb3aa201b5e63786b641bf83ec85acb7626fae4f5c9702244213c8b85e3b", 0x7d}, {&(0x7f0000005600)}], 0x4, &(0x7f00000056c0)=[{0x10, 0x1, 0x3}, {0x10, 0x107, 0x1000}], 0x20}, 0x4811) socket$kcm(0x29, 0x7, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r5) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='threaded\x00', 0x9) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r3, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r6, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:10 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="12aeca781b01de2067cb8190cad6df900fe3d324f96918b98aa177e41a6eefd4a78313acabd183e0dd80c04a379a2e052e0d"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) 23:07:10 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x7b, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:10 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') r0 = openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$SNDCTL_DSP_GETTRIGGER(r0, 0x80045010, &(0x7f0000000000)) 23:07:10 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x7b, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 458.198319][T17223] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 458.273017][T17223] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:11 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000200)=@filename='./file0/file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000240)='/proc/self/net/pfkey\x00O\xae\xfc\x88\xf76D\x90\xffY#l\xf5\x1f\xe7\x1fk\x92H') pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x11, 0x2, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) r5 = syz_genetlink_get_family_id$netlbl_unlabel(0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x10005, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000001580)=ANY=[@ANYPTR, @ANYPTR64=&(0x7f0000000480)=ANY=[@ANYRES64, @ANYRES16, @ANYRES64, @ANYRES32=r7, @ANYBLOB="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", @ANYRES32], @ANYBLOB="70fd168544c6d8373fde6368a890a40d782d06847021a5939bdc618a4700043621ccbf023ebbcbc511eb8f1c6f7ee3cfc26be04a"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICLIST(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x4c, r5, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast1}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6erspan0\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000001}, 0x40001) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=@newlink={0x38, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN={0x10, 0x2, {0xffff100f}}]}]}]}, 0x38}}, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r2, 0x200, 0x70bd29, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x3}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1ff}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24000000}, 0x24044004) 23:07:11 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2f6465762f6e626430004cde07000000b40f4a62c94d9064ab9fadba4eba74d855a1d8c40c30901b64f481aa49c68f7d4eae0f944528"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) bind$can_raw(r0, &(0x7f00000000c0), 0x10) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r3, 0x80082102, &(0x7f0000000000)) 23:07:11 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2f3cebaaa5fe6e88fc2f6e62643000"], &(0x7f0000000280)='./file0\x00', &(0x7f0000000000)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x3) 23:07:11 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) sendmsg$kcm(r2, &(0x7f00000058c0)={&(0x7f00000053c0)=@xdp={0x2c, 0xd, r4}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005440)="cf2ae02656b6f168811d35c075d6580d2d0c92dd", 0x14}, {&(0x7f0000005480)="efeb5898abda3b9ad5034b78bf0f6294d433b1139ea768a90a2ce826c08f31e371f50e8ac43210d8aaae9d2667ed6c6b3179c04f57411657d9118dafbfacb1f9e611556311c685214089ab7566ebd0230bf061f4488a3e7c9b158e5a65c75b95e992e1c5dc6c45bf2e58efb022d8217b552293c41e9247496cefd26a556d39af59d5c90f5eb371518f3462ee2e73cbb23c35eaf72270e74218b89cf4f66866effb37af0f7cc2684fd62865ee099c03490a99f5a941cb2d362647eacc09905072680ab894", 0xc4}, {&(0x7f0000005580)="18cd42f433c5716326976c4f64bd6ed430e578ce237938c75fb96107495b449493a0006579ffd61579f6c102883431c4dfff23847013dbc493e40a3cc0ac4e79de38a8ebc42b5bb74b8607cad09f676a04e5afefd7857ca6048a7320e305e7cb3aa201b5e63786b641bf83ec85acb7626fae4f5c9702244213c8b85e3b", 0x7d}, {&(0x7f0000005600)}], 0x4, &(0x7f00000056c0)=[{0x10, 0x1, 0x3}, {0x10, 0x107, 0x1000}], 0x20}, 0x4811) socket$kcm(0x29, 0x7, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r5) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='threaded\x00', 0x9) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r3, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:11 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x7b, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 458.521264][T17234] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 458.579935][T17234] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:11 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='/03v/nbd0\x00'], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x10005, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f0000000000)='(selfvmnet1#system^{\x00', &(0x7f0000000080)='./file0\x00', r2) 23:07:11 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000000)={0x4, 0x5, "56c720", 0x4, 0xb5}) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='/dd0\x00'], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:11 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2b6465762f6e6266c528"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) close(r1) fcntl$setstatus(r1, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r1, 0x8, r2) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r3, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x1000000c8) getpeername$tipc(r3, &(0x7f0000000100), &(0x7f0000000140)=0x10) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x9, 0x4, 0x40, 0x20, 0x0, 0x20, 0x9385, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000000), 0x2}, 0xc0, 0x7, 0xf4, 0x4, 0x2e0e, 0x3, 0x4}, r2, 0x6, r3, 0x3) r4 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KDSKBLED(r4, 0x4b65, 0x520d) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) 23:07:11 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) sendmsg$kcm(r2, &(0x7f00000058c0)={&(0x7f00000053c0)=@xdp={0x2c, 0xd, r4}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005440)="cf2ae02656b6f168811d35c075d6580d2d0c92dd", 0x14}, {&(0x7f0000005480)="efeb5898abda3b9ad5034b78bf0f6294d433b1139ea768a90a2ce826c08f31e371f50e8ac43210d8aaae9d2667ed6c6b3179c04f57411657d9118dafbfacb1f9e611556311c685214089ab7566ebd0230bf061f4488a3e7c9b158e5a65c75b95e992e1c5dc6c45bf2e58efb022d8217b552293c41e9247496cefd26a556d39af59d5c90f5eb371518f3462ee2e73cbb23c35eaf72270e74218b89cf4f66866effb37af0f7cc2684fd62865ee099c03490a99f5a941cb2d362647eacc09905072680ab894", 0xc4}, {&(0x7f0000005580)="18cd42f433c5716326976c4f64bd6ed430e578ce237938c75fb96107495b449493a0006579ffd61579f6c102883431c4dfff23847013dbc493e40a3cc0ac4e79de38a8ebc42b5bb74b8607cad09f676a04e5afefd7857ca6048a7320e305e7cb3aa201b5e63786b641bf83ec85acb7626fae4f5c9702244213c8b85e3b", 0x7d}, {&(0x7f0000005600)}], 0x4, &(0x7f00000056c0)=[{0x10, 0x1, 0x3}, {0x10, 0x107, 0x1000}], 0x20}, 0x4811) socket$kcm(0x29, 0x7, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r5) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='threaded\x00', 0x9) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r3, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:11 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x7b, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:11 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) connect$unix(r0, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') r1 = openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000080)={0x7, 0x4, 0x4, 0x100000, 0x1b358ad2, {0x77359400}, {0x1, 0x8, 0x2, 0x82, 0xff, 0x81, "074f94db"}, 0x0, 0x3, @offset=0x3, 0x825c}) 23:07:11 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x800, 0x1) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) recvfrom(r0, &(0x7f0000000080)=""/138, 0x8a, 0x2, &(0x7f0000000140)=@caif, 0x80) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:11 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) sendmsg$kcm(r2, &(0x7f00000058c0)={&(0x7f00000053c0)=@xdp={0x2c, 0xd, r4}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005440)="cf2ae02656b6f168811d35c075d6580d2d0c92dd", 0x14}, {&(0x7f0000005480)="efeb5898abda3b9ad5034b78bf0f6294d433b1139ea768a90a2ce826c08f31e371f50e8ac43210d8aaae9d2667ed6c6b3179c04f57411657d9118dafbfacb1f9e611556311c685214089ab7566ebd0230bf061f4488a3e7c9b158e5a65c75b95e992e1c5dc6c45bf2e58efb022d8217b552293c41e9247496cefd26a556d39af59d5c90f5eb371518f3462ee2e73cbb23c35eaf72270e74218b89cf4f66866effb37af0f7cc2684fd62865ee099c03490a99f5a941cb2d362647eacc09905072680ab894", 0xc4}, {&(0x7f0000005580)="18cd42f433c5716326976c4f64bd6ed430e578ce237938c75fb96107495b449493a0006579ffd61579f6c102883431c4dfff23847013dbc493e40a3cc0ac4e79de38a8ebc42b5bb74b8607cad09f676a04e5afefd7857ca6048a7320e305e7cb3aa201b5e63786b641bf83ec85acb7626fae4f5c9702244213c8b85e3b", 0x7d}, {&(0x7f0000005600)}], 0x4, &(0x7f00000056c0)=[{0x10, 0x1, 0x3}, {0x10, 0x107, 0x1000}], 0x20}, 0x4811) socket$kcm(0x29, 0x7, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r5) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='threaded\x00', 0x9) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r3, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 459.184161][T17267] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:11 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x7b, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 459.283248][T17274] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:12 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) sendmsg$kcm(r2, &(0x7f00000058c0)={&(0x7f00000053c0)=@xdp={0x2c, 0xd, r4}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005440)="cf2ae02656b6f168811d35c075d6580d2d0c92dd", 0x14}, {&(0x7f0000005480)="efeb5898abda3b9ad5034b78bf0f6294d433b1139ea768a90a2ce826c08f31e371f50e8ac43210d8aaae9d2667ed6c6b3179c04f57411657d9118dafbfacb1f9e611556311c685214089ab7566ebd0230bf061f4488a3e7c9b158e5a65c75b95e992e1c5dc6c45bf2e58efb022d8217b552293c41e9247496cefd26a556d39af59d5c90f5eb371518f3462ee2e73cbb23c35eaf72270e74218b89cf4f66866effb37af0f7cc2684fd62865ee099c03490a99f5a941cb2d362647eacc09905072680ab894", 0xc4}, {&(0x7f0000005580)="18cd42f433c5716326976c4f64bd6ed430e578ce237938c75fb96107495b449493a0006579ffd61579f6c102883431c4dfff23847013dbc493e40a3cc0ac4e79de38a8ebc42b5bb74b8607cad09f676a04e5afefd7857ca6048a7320e305e7cb3aa201b5e63786b641bf83ec85acb7626fae4f5c9702244213c8b85e3b", 0x7d}, {&(0x7f0000005600)}], 0x4, &(0x7f00000056c0)=[{0x10, 0x1, 0x3}, {0x10, 0x107, 0x1000}], 0x20}, 0x4811) socket$kcm(0x29, 0x7, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r5) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='threaded\x00', 0x9) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r6, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:12 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x7b, &(0x7f00000022c0)=ANY=[@ANYBLOB="850000006d00000025000000000000009500000000000000afcd48d6494d614d1612ba392176dd2963228e1d69ba7ea94c500dc4ef2fad96ed406f21caf593836d9ea2cfb0e60436e054258c4686b066707de94a4f4d5fc79c987d669f2b1faca0f9d9924be41a9169bdfaf16d1c0b153911b8dd7f165789c691de6eee84309e7a23c19a39484809539fca4e0b6ec015a7d55545a34effa077faa55c59e88254f54077f799bf1683537a8ea0244d35b213bda80cc172afd80e361bedd8b8cc57255a5e3d77ac463920e231b7ae0da8616d2b7958f9005d822175ed60ab386d94af98af1da2b59525f8fe3b28d7e53c78fbfe5ab0255f347160ec8343e1494d3a63e57a15cf10453f6c0bb13b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0010f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f132a902e5111f2cc5e46ac1c60a9b10c074bfbcd4b09012175484135f0e519f0b1c4aaa026d570ecb5e8cddbed65ff76ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef479570c8ad943e392957b4f979ea17117a13201bafe4f0f6ea5a6c957ada0c548552b571bed5647223e78a99625bbca4fd91bc404ec13eaa66580ae7b813071cbb17d9f37282462f03de147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb5567e54d3504723177d356c4604b7a492ecec37e83efceefd7ca253cbc8edc8be05cc85451c6a14507434eb54b6f43caea5c4bf690441974b155f5adc6825a3a3d5b754df23175e2ce8b03bf3e3c033e54e4ba9b05292bfdb26f4cd7e166cc384b2845c537b397aaea0eac888419583ccaba598e6d8024920428e070ff941dd7067cb53879c3dbfa852e8fa7aa3d926c6d8aa1f82c76bc59352e82be8e52dce88f66bdb061681fc3b393f75eb23d5c6b4c0ac8ef660a37342f1d9a5d5c14b6b7e8611e5d311a20213ed6ac7b8d66fcc4b7454316338d928b8fff2739e811784d6873207c10ac73e264a6e65bf33020fc466df9ed2764ee2d076e5b68fa1642ebf17caf01bce8e02c31a13ceb7fed854b0625741964fdb2737505f8f584e4c14bd36b9e0608843fc32c6642091765068554ac92b42e467f69b499ecef34d2e6195365822b5577b3dd5f5c3424e7b6faea95c0109873eb52fb8e5a604c8adbf404a4dd79ce8c29f968f56dd583c3e9875678ca16f6b579cde0c1a0ab95f99620e84c0487e6565c04de458761768de308ff95a7189a7731378f0b171f99240f8167693329744d0e41639dca4859753d3"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:12 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:12 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2f6465762f6c6f6f703000c46f8622d07480bc32e95b6d010000009709846e5a7bcbedcab48db9665cf1d5e9ac3cbb0d0790697a800b01000000bd1f7949992b2abb67526523deb86d6e856316fe8adf966345b8e2f715c4480f4a5064228c49738bd248ef52f71724cb7ece8c768724cbefbb56b6abe301267aede505"], &(0x7f0000000280)='./file0\x00', &(0x7f0000000080)='cgroup\x00', 0x0, &(0x7f0000000340)='/0poc/self/netr\xd2\x1b{ey\x00') ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) 23:07:12 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) sendmsg$kcm(r2, &(0x7f00000058c0)={&(0x7f00000053c0)=@xdp={0x2c, 0xd, r4}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005440)="cf2ae02656b6f168811d35c075d6580d2d0c92dd", 0x14}, {&(0x7f0000005480)="efeb5898abda3b9ad5034b78bf0f6294d433b1139ea768a90a2ce826c08f31e371f50e8ac43210d8aaae9d2667ed6c6b3179c04f57411657d9118dafbfacb1f9e611556311c685214089ab7566ebd0230bf061f4488a3e7c9b158e5a65c75b95e992e1c5dc6c45bf2e58efb022d8217b552293c41e9247496cefd26a556d39af59d5c90f5eb371518f3462ee2e73cbb23c35eaf72270e74218b89cf4f66866effb37af0f7cc2684fd62865ee099c03490a99f5a941cb2d362647eacc09905072680ab894", 0xc4}, {&(0x7f0000005580)="18cd42f433c5716326976c4f64bd6ed430e578ce237938c75fb96107495b449493a0006579ffd61579f6c102883431c4dfff23847013dbc493e40a3cc0ac4e79de38a8ebc42b5bb74b8607cad09f676a04e5afefd7857ca6048a7320e305e7cb3aa201b5e63786b641bf83ec85acb7626fae4f5c9702244213c8b85e3b", 0x7d}, {&(0x7f0000005600)}], 0x4, &(0x7f00000056c0)=[{0x10, 0x1, 0x3}, {0x10, 0x107, 0x1000}], 0x20}, 0x4811) socket$kcm(0x29, 0x7, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r5) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='threaded\x00', 0x9) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r6, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:12 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="850000006d00000025000000000000009500000000000000afcd48d6494d614d1612ba392176dd2963228e1d69ba7ea94c500dc4ef2fad96ed406f21caf593836d9ea2cfb0e60436e054258c4686b066707de94a4f4d5fc79c987d669f2b1faca0f9d9924be41a9169bdfaf16d1c0b153911b8dd7f165789c691de6eee84309e7a23c19a39484809539fca4e0b6ec015a7d55545a34effa077faa55c59e88254f54077f799bf1683537a8ea0244d35b213bda80cc172afd80e361bedd8b8cc57255a5e3d77ac463920e231b7ae0da8616d2b7958f9005d822175ed60ab386d94af98af1da2b59525f8fe3b28d7e53c78fbfe5ab0255f347160ec8343e1494d3a63e57a15cf10453f6c0bb13b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0010f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f132a902e5111f2cc5e46ac1c60a9b10c074bfbcd4b09012175484135f0e519f0b1c4aaa026d570ecb5e8cddbed65ff76ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef479570c8ad943e392957b4f979ea17117a13201bafe4f0f6ea5a6c957ada0c548552b571bed5647223e78a99625bbca4fd91bc404ec13eaa66580ae7b813071cbb17d9f37282462f03de147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb5567e54d3504723177d356c4604b7a492ecec37e83efceefd7ca253cbc8edc8be05cc85451c6a14507434eb54b6f43caea5c4bf690441974b155f5adc6825a3a3d5b754df23175e2ce8b03bf3e3c033e54e4ba9b05292bfdb26f4cd7e166cc384b2845c537b397aaea0eac888419583ccaba598e6d8024920428e070ff941dd7067cb53879c3dbfa852e8fa7aa3d926c6d8aa1f82c76bc59352e82be8e52dce88f66bdb061681fc3b393f75eb23d5c6b4c0ac8ef660a37342f1d9a5d5c14b6b7e8611e5d311a20213ed6ac7b8d66fcc4b7454316338d928b8fff2739e811784d6873207c10ac73e264a6e65bf33020fc466df9ed2764ee2d076e5b68fa1642ebf17caf01bce8e02c31a13ceb7fed854b0625741964fdb2737505f8f584e4c14bd36b9e0608843fc32c6642091765068554ac92b42e467f69b499ecef34d2e6195365822b5577b3dd5f5c3424e7b6faea95c0109873eb52fb8e5a604c8adbf404a4dd79ce8c29f968f56dd583c3e9875678ca16f6b579cde0c1a0ab95f99620e84c0487e6565c04de458761768de308ff95a7189a7731378f0b171f99240f8167693329744d0e41639dca4859753d3"], &(0x7f0000000000)='GPL\x00', 0x0, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:12 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x2180010, &(0x7f0000000340)='f/neu\xafpfkeY\x04\x00\x00\x00\x00\xf4\x9a\x00\x00\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) [ 459.920385][T17293] cgroup: Unknown subsys name '/0poc/self/netrÒ{ey' [ 459.935685][T17274] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 459.962318][T17293] cgroup: Unknown subsys name '/0poc/self/netrÒ{ey' 23:07:12 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:12 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) sendmsg$kcm(r2, &(0x7f00000058c0)={&(0x7f00000053c0)=@xdp={0x2c, 0xd, r4}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005440)="cf2ae02656b6f168811d35c075d6580d2d0c92dd", 0x14}, {&(0x7f0000005480)="efeb5898abda3b9ad5034b78bf0f6294d433b1139ea768a90a2ce826c08f31e371f50e8ac43210d8aaae9d2667ed6c6b3179c04f57411657d9118dafbfacb1f9e611556311c685214089ab7566ebd0230bf061f4488a3e7c9b158e5a65c75b95e992e1c5dc6c45bf2e58efb022d8217b552293c41e9247496cefd26a556d39af59d5c90f5eb371518f3462ee2e73cbb23c35eaf72270e74218b89cf4f66866effb37af0f7cc2684fd62865ee099c03490a99f5a941cb2d362647eacc09905072680ab894", 0xc4}, {&(0x7f0000005580)="18cd42f433c5716326976c4f64bd6ed430e578ce237938c75fb96107495b449493a0006579ffd61579f6c102883431c4dfff23847013dbc493e40a3cc0ac4e79de38a8ebc42b5bb74b8607cad09f676a04e5afefd7857ca6048a7320e305e7cb3aa201b5e63786b641bf83ec85acb7626fae4f5c9702244213c8b85e3b", 0x7d}, {&(0x7f0000005600)}], 0x4, &(0x7f00000056c0)=[{0x10, 0x1, 0x3}, {0x10, 0x107, 0x1000}], 0x20}, 0x4811) socket$kcm(0x29, 0x7, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r5) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='threaded\x00', 0x9) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r6, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:12 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="4e6465762f8f626430003d87cfece0de1f05c64a6f1b7faf756d107fecaa7bd693cd0b2a0f0bbf259b1746248c5ecdaaef9a682f1bc690c95b09495328daf74b5233f32f6feafe11901393727e3164659cb1e4c7ac0bd38e9c9bb111df05a645ced8ca8f0adb75eae286cb74f88a5e89910cec53559b5b4add00"/134], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:12 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2f644710e4aea9a800002177b4fe12053347fcead07c65c16f8d09b9635afb639289eed25d588a9916578cd9a9c2b4af5948684208d98e1b56a3f3edf0483a2eb7bec7416f8617db9bbc4b19fae26c02d4ee99ce6568c08cf833e4caa0645ecb30f9bd5fa6bd38f7d1472ac97b6e64"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) execveat(r0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000140)='udf\x00', &(0x7f0000000180)='\x00', &(0x7f00000001c0)='ppp0@/vboxnet0\xafselinuxem1\x00', &(0x7f0000000200)='\\\x00', &(0x7f0000000240)='udf\x00', &(0x7f0000000300)='/proc/self/net/pfkey\x00', &(0x7f0000000380)='ppp0&\x00', &(0x7f00000003c0)='/proc/self/net/pfkey\x00'], &(0x7f00000005c0)=[&(0x7f0000000440)=',\x00', &(0x7f0000000480)='\\eth0md5sum)GPLwlan1!%lo\'security$(\x00', &(0x7f00000004c0)='em1\x00', &(0x7f0000000500)='/proc/self/net/pfkey\x00', &(0x7f0000000540)='0\x00', &(0x7f0000000580)='/proc/self/net/pfkey\x00'], 0x1000) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000000)=0x1, 0x4) 23:07:12 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x10005, 0x0) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r1, 0xc01064bd, &(0x7f0000000100)={&(0x7f00000001c0)="4c9ffe0d3b4ecd4deb040310df3939eb633ebc66e525385ac86361c5d255e28ed5d954cd27fd4aa76a6e67c03dcc4397b92ebb2aba4decb7c780e2c7e6c68ad29c165a448eb97cb8a7540886454ceb31da4717a344662df7715656574d7650334fcb799f3fe23fc1ed71666211", 0x6d, 0x1}) ioctl$DRM_IOCTL_MODE_DESTROYPROPBLOB(r0, 0xc00464be, &(0x7f0000000300)={r3}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r2, 0x8982, &(0x7f0000000380)={0x7, 'batadv_slave_0\x00', {0x8}, 0x200}) splice(r0, 0x0, r4, 0x0, 0x10005, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x11, 0x2, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) pidfd_getfd(0xffffffffffffffff, r6, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000340)={&(0x7f00000003c0)=@ipv4_deladdr={0x0, 0x15, 0x2, 0x70bd28, 0x25dfdbfb, {0x2, 0x50, 0xdd, 0xfe, r7}, [@IFA_BROADCAST={0x0, 0x4, @broadcast}, @IFA_ADDRESS={0x0, 0x1, @loopback}, @IFA_BROADCAST={0x0, 0x4, @dev={0xac, 0x14, 0x14, 0x11}}, @IFA_FLAGS={0x0, 0x8, 0x4}, @IFA_BROADCAST={0x0, 0x4, @multicast1}, @IFA_FLAGS={0x0, 0x8, 0x4}]}, 0x38}}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team_slave_1\x00', r7}) 23:07:12 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000002280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x30, 0x16, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_HOOK={0x4}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x78}}, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x100, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PPPIOCSACTIVE(r4, 0x40107446, &(0x7f0000000380)={0x7, &(0x7f0000000340)=[{0x200, 0xfe, 0x20, 0x5}, {0x8, 0xff, 0x9, 0xd719}, {0x1, 0x1, 0xbd, 0x4}, {0x5, 0x4, 0x29, 0x2}, {0x7, 0x9, 0x53, 0x5}, {0x9, 0x0, 0x2, 0x8000}, {0x1ff, 0x8, 0x0, 0x80000001}]}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$CAN_RAW_RECV_OWN_MSGS(r2, 0x65, 0x4, &(0x7f0000000200), &(0x7f0000000300)=0x4) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f6465792fa6737230"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000080)='\xac7roc/self/net/pfkey\x00\x90\xfe\xae\xd9}d\xe3\x06t2\xbcNG\xf9\x84d\x1b\xad\x0fQ\xe9v\xac\xed\xc0X\xc9(%\x86\xcd\xa9?\xfe\xe6\xc4D\x905\xbf\x91\f\x10\xa9\x93\xc7\xe1Q\x19D\xc4C\x88\xf7\x1b\xb2\x9cZ\xea\x97\x0ez<\xe1\'{U\x89\xf4\xff\xc0\'s2\xa6A\x93\xd0\xf7@Q\x13g\x89i9\xd1\xf8\xea/\xca\xa5NU\x06\x15E^M\x83\x06;\xa6\xf3\"e\xdc\xd5\x1b\xf9\xe6Lt\x1c\xc7\x8erhiG\xfb\xb7c\xa9\x11\x83\x00\xea\xfa\x85\t\x84\xde\x1a~o\xe4\b\x83wx\xbed\x9f3h\xbc\x9bn\x1a8J,hQ\'\xf4\x03AuM\xfd\x14Vj+\x02\x98\x9c\x9c-\xe2\x19\xef~\xa0\xe6') r5 = openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, &(0x7f0000000000)={0x3, 0xfff, 0x0, 0x4, 0x7f}) 23:07:12 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x7b, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 460.233879][T17308] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:12 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="bbbbbbbbbbbbffffffffffff910032008100450008050000133985648337f56cf790ef18b1b035ab05fb0a6d2c0c88ac4c3c066a7f7ede11c727361cde8867fa2bf2277503dd15c205e9d3dd9db721dcdf590325a914af96f6a29aacaeb2ea6a8149ce6d65fb29ce5613e35ef59a4c4f40bbb2984c38a2b6d922b0cd11a3e87484b1faf07b8c04e929d6770ce3971cf536f03393ba989cbd003de703752ea41e56b65dc882dd4da8aea98bcf473e09a88a6057f2da8d8ac61fbf61b43296f6e23676b0d3760e3c17c6927fbc337242868eec408d0c2e7dce96876db3e01efa0e58fd1e1799d762ee44b1ac5c63d8d6efca41b8c299870f0435866ef79f7e45efc43e56109f46b0142a0a471b"], 0xfffffffffffffe1b) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) mq_notify(r0, &(0x7f0000000140)={0x0, 0x33, 0x1, @thr={&(0x7f0000000080)="2f3148183e3bbdc8debaf35177c4d9d3bdb6729d37915bd026d1864e19ce141790e162025cea97f7703480c09b014e3e96950937fad80136b329395f76d8f0191ea6609c3ca2b32033bec4b34a994284b34bd9f57591a514966e3a2d7eb2a95db42235bfce4094663fec7ef0cf3b6a938fa36de4c120e8736fcfda3f1d1ca496d804d4f93799d6ab3847d14bdd6cc1890af6b73510f83c954e5a48", &(0x7f0000000000)="f9259e2d27b4560898d1b49a43603393ad85e8e0321b80e6"}}) 23:07:13 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) sendmsg$kcm(r2, &(0x7f00000058c0)={&(0x7f00000053c0)=@xdp={0x2c, 0xd, r4}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005440)="cf2ae02656b6f168811d35c075d6580d2d0c92dd", 0x14}, {&(0x7f0000005480)="efeb5898abda3b9ad5034b78bf0f6294d433b1139ea768a90a2ce826c08f31e371f50e8ac43210d8aaae9d2667ed6c6b3179c04f57411657d9118dafbfacb1f9e611556311c685214089ab7566ebd0230bf061f4488a3e7c9b158e5a65c75b95e992e1c5dc6c45bf2e58efb022d8217b552293c41e9247496cefd26a556d39af59d5c90f5eb371518f3462ee2e73cbb23c35eaf72270e74218b89cf4f66866effb37af0f7cc2684fd62865ee099c03490a99f5a941cb2d362647eacc09905072680ab894", 0xc4}, {&(0x7f0000005580)="18cd42f433c5716326976c4f64bd6ed430e578ce237938c75fb96107495b449493a0006579ffd61579f6c102883431c4dfff23847013dbc493e40a3cc0ac4e79de38a8ebc42b5bb74b8607cad09f676a04e5afefd7857ca6048a7320e305e7cb3aa201b5e63786b641bf83ec85acb7626fae4f5c9702244213c8b85e3b", 0x7d}, {&(0x7f0000005600)}], 0x4, &(0x7f00000056c0)=[{0x10, 0x1, 0x3}, {0x10, 0x107, 0x1000}], 0x20}, 0x4811) socket$kcm(0x29, 0x7, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r5) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='threaded\x00', 0x9) sendmsg$kcm(r3, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r6, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 460.360185][T17308] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 460.436732][T17322] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:13 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x7b, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:13 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x6c44c1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000080)={{0x1, 0x0, 0x9, 0x0, 0x3}, 0xfffffffeffffffff, 0x2}) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r3, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x1000000c8) ioctl$KVM_ASSIGN_SET_MSIX_NR(r3, 0x4008ae73, &(0x7f0000000100)={0x3ff, 0xfffb}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$CAPI_NCCI_OPENCOUNT(r5, 0x80044326, &(0x7f0000000380)=0x3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) accept$unix(r2, &(0x7f0000000140), &(0x7f0000000300)=0x6e) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="42c6c52f8d04c735a71bbf0662530dad1752c7a409e2b21f5a6be60c3936f2f74b6781647c93333cb361c8872e100df5263d6acbbda39bd065a8901bfaff1afcffffffc4c4a9d7cefc02a15e000099ca6aaaebe91c67abd59f2ca200ee060c27cfc8e8faaf531b0edd65852390aa33d15bfe6320ba7ca8d7bacef4fddf23134a5c7eabb002003e4d0690c7f984a7fe32dd58445066fbe7310173151d6f10234a579e36915c72547dc6af08e8b5b22540c27609cddb"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:13 executing program 3: mknod$loop(&(0x7f0000000480)='./file0/file0\x00', 0x0, 0x1) fsopen(&(0x7f00000004c0)='jfs\x00', 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000bbbbbbbbbbbbffffffffffff8100000008050000000e41e64060bd6e60d6269e3872ff93089d5110837fdc9010f29bdf28912ca259df6a6efdd848c3e0808bb1d849991ea7f442c0d2cef3f0701bb21accf12b1d88ed54a61434ca47d86f09000000a186"], 0x19) sendmsg$sock(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000000)="65d8c726ba31b6bbf7ae718b6ea46009544ad2e2fe1f", 0x16}, {&(0x7f0000000080)="f1bf1290b6b291f47a26ef093a0de8a4408b07ef0bd7348f8c69df79542c9e2fd67085bf8d0090124fd7f7abc3", 0x2d}, {&(0x7f00000000c0)="123d97c639c164c4af804f8aa32bc53981cefad8912ef7fd8128861b925e6eeffb65360dd3d618203b6567387160b802c095038730313c1410404ef93a76600b7f682fa07cd5e089333b6ad496e1e829c5fbb8e3e0173a1c1a64b05d5a4e2f9e52", 0x61}, {&(0x7f0000000140)="454983c2a176125e8889a3f0da34a4750acf7a3737c3c289343d5fc04bcbf773c498ea3ad859c530fd1a53e020cfcbafc8c3ea1b6ce37924c83f4c1cc8d2cda944df23f02686eb60e2c27d1534b791f5ff76fa6b91", 0x55}, {&(0x7f00000001c0)="a383418f793587b30ef4c631b42a3289e855d8c97732e8b1c0fa8c3d111b5126172f713603595c1d21dee3236a3d431e7581126cfb16506cfb81329c72be31d49238890d4ed0f9a6e886e0d74622a74ca10d6ea94aa6fcb43b8e4ca0e9087febac350133c7e7e3b26636e660edeaa8e82e265e1ef0ac", 0x76}], 0x5, &(0x7f0000000400)=[@txtime={{0x18, 0x1, 0x3d, 0x2}}, @txtime={{0x18, 0x1, 0x3d, 0xfffffffeffffffff}}, @timestamping={{0x14, 0x1, 0x25, 0xfffffffe}}, @timestamping={{0x14, 0x1, 0x25, 0xd5}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}], 0x78}, 0x20000014) openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) 23:07:13 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x4, 0x1) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f6465762f4e6264300046930dfae6f21677"], &(0x7f0000000280)='./file0\x00', &(0x7f0000000000)='exfat\x00', 0x0, &(0x7f0000000080)='/proc/s\x82lf/net/pfkey\x00U\xc3\xaa\x92\a\x00\x0f\x95\xbei\x7f3U\xb1$_X\x86\xe0\xab\xdd\xfe\xec\xb9\x9fl\xdd\xd9\x02]\x04\x1c\x1a\xd5\x14\xa1\x15D\xe2\x97s\xcb\x06\x9f\x06^c\xf3\xf2\xd9w\x9ae\xf8+a\x86\xdd\xf3\xe3\xf6\x17\xcb\x9e\xaa\xf7\x9bx\x11s#\\\xd5@V\xb1\xa6\x93h*\xedY\xbf\xeda\xc9y\xa8dH\x13g\t\x11E\x065\xde\xc6\x18') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0x4) 23:07:13 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x7b, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:13 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) sendmsg$kcm(r2, &(0x7f00000058c0)={&(0x7f00000053c0)=@xdp={0x2c, 0xd, r4}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005440)="cf2ae02656b6f168811d35c075d6580d2d0c92dd", 0x14}, {&(0x7f0000005480)="efeb5898abda3b9ad5034b78bf0f6294d433b1139ea768a90a2ce826c08f31e371f50e8ac43210d8aaae9d2667ed6c6b3179c04f57411657d9118dafbfacb1f9e611556311c685214089ab7566ebd0230bf061f4488a3e7c9b158e5a65c75b95e992e1c5dc6c45bf2e58efb022d8217b552293c41e9247496cefd26a556d39af59d5c90f5eb371518f3462ee2e73cbb23c35eaf72270e74218b89cf4f66866effb37af0f7cc2684fd62865ee099c03490a99f5a941cb2d362647eacc09905072680ab894", 0xc4}, {&(0x7f0000005580)="18cd42f433c5716326976c4f64bd6ed430e578ce237938c75fb96107495b449493a0006579ffd61579f6c102883431c4dfff23847013dbc493e40a3cc0ac4e79de38a8ebc42b5bb74b8607cad09f676a04e5afefd7857ca6048a7320e305e7cb3aa201b5e63786b641bf83ec85acb7626fae4f5c9702244213c8b85e3b", 0x7d}, {&(0x7f0000005600)}], 0x4, &(0x7f00000056c0)=[{0x10, 0x1, 0x3}, {0x10, 0x107, 0x1000}], 0x20}, 0x4811) socket$kcm(0x29, 0x7, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r5) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='threaded\x00', 0x9) sendmsg$kcm(r3, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r6, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:13 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="bbbbbbbbbb0900ffffffffff81000000080f000000"], 0x15) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) accept4$tipc(r2, &(0x7f0000000000), &(0x7f0000000080)=0xffffffffffffff27, 0x80800) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) 23:07:13 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x7b, &(0x7f00000022c0)=ANY=[@ANYBLOB="850000006d00000025000000000000009500000000000000afcd48d6494d614d1612ba392176dd2963228e1d69ba7ea94c500dc4ef2fad96ed406f21caf593836d9ea2cfb0e60436e054258c4686b066707de94a4f4d5fc79c987d669f2b1faca0f9d9924be41a9169bdfaf16d1c0b153911b8dd7f165789c691de6eee84309e7a23c19a39484809539fca4e0b6ec015a7d55545a34effa077faa55c59e88254f54077f799bf1683537a8ea0244d35b213bda80cc172afd80e361bedd8b8cc57255a5e3d77ac463920e231b7ae0da8616d2b7958f9005d822175ed60ab386d94af98af1da2b59525f8fe3b28d7e53c78fbfe5ab0255f347160ec8343e1494d3a63e57a15cf10453f6c0bb13b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0010f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f132a902e5111f2cc5e46ac1c60a9b10c074bfbcd4b09012175484135f0e519f0b1c4aaa026d570ecb5e8cddbed65ff76ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef479570c8ad943e392957b4f979ea17117a13201bafe4f0f6ea5a6c957ada0c548552b571bed5647223e78a99625bbca4fd91bc404ec13eaa66580ae7b813071cbb17d9f37282462f03de147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb5567e54d3504723177d356c4604b7a492ecec37e83efceefd7ca253cbc8edc8be05cc85451c6a14507434eb54b6f43caea5c4bf690441974b155f5adc6825a3a3d5b754df23175e2ce8b03bf3e3c033e54e4ba9b05292bfdb26f4cd7e166cc384b2845c537b397aaea0eac888419583ccaba598e6d8024920428e070ff941dd7067cb53879c3dbfa852e8fa7aa3d926c6d8aa1f82c76bc59352e82be8e52dce88f66bdb061681fc3b393f75eb23d5c6b4c0ac8ef660a37342f1d9a5d5c14b6b7e8611e5d311a20213ed6ac7b8d66fcc4b7454316338d928b8fff2739e811784d6873207c10ac73e264a6e65bf33020fc466df9ed2764ee2d076e5b68fa1642ebf17caf01bce8e02c31a13ceb7fed854b0625741964fdb2737505f8f584e4c14bd36b9e0608843fc32c6642091765068554ac92b42e467f69b499ecef34d2e6195365822b5577b3dd5f5c3424e7b6faea95c0109873eb52fb8e5a604c8adbf404a4dd79ce8c29f968f56dd583c3e9875678ca16f6b579cde0c1a0ab95f99620e84c0487e6565c04de458761768de308ff95a7189a7731378f0b171f99240f8167693329744d0e41639dca4859753d3"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:13 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) sendmsg$kcm(r2, &(0x7f00000058c0)={&(0x7f00000053c0)=@xdp={0x2c, 0xd, r4}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005440)="cf2ae02656b6f168811d35c075d6580d2d0c92dd", 0x14}, {&(0x7f0000005480)="efeb5898abda3b9ad5034b78bf0f6294d433b1139ea768a90a2ce826c08f31e371f50e8ac43210d8aaae9d2667ed6c6b3179c04f57411657d9118dafbfacb1f9e611556311c685214089ab7566ebd0230bf061f4488a3e7c9b158e5a65c75b95e992e1c5dc6c45bf2e58efb022d8217b552293c41e9247496cefd26a556d39af59d5c90f5eb371518f3462ee2e73cbb23c35eaf72270e74218b89cf4f66866effb37af0f7cc2684fd62865ee099c03490a99f5a941cb2d362647eacc09905072680ab894", 0xc4}, {&(0x7f0000005580)="18cd42f433c5716326976c4f64bd6ed430e578ce237938c75fb96107495b449493a0006579ffd61579f6c102883431c4dfff23847013dbc493e40a3cc0ac4e79de38a8ebc42b5bb74b8607cad09f676a04e5afefd7857ca6048a7320e305e7cb3aa201b5e63786b641bf83ec85acb7626fae4f5c9702244213c8b85e3b", 0x7d}, {&(0x7f0000005600)}], 0x4, &(0x7f00000056c0)=[{0x10, 0x1, 0x3}, {0x10, 0x107, 0x1000}], 0x20}, 0x4811) socket$kcm(0x29, 0x7, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r5) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='threaded\x00', 0x9) sendmsg$kcm(r3, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r6, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:13 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x7b, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 461.188129][T17352] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:13 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000140)=@filename='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='udf\x00', 0x100c018, &(0x7f0000000100)='/proc\x00\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00E9\xa7\r\xe3\xb3\xbf4\x12\xe3\x95\xa5!\x06~\xfe\x8e\x95o\xcc\x8c\x11\xdc\x00\x00\x00\x00\xab\x7fXm\xee[\xd4\v4\x0f\\\x96$\xbb4\x82') 23:07:14 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2a64cc00ccc81dbc"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x20080, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x18, &(0x7f0000000080)={r3}, 0x8) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r4, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x1000000c8) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={r6}, 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000000c0)={r6, 0x8}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000140)={r7, @in={{0x2, 0x4e20, @multicast2}}, 0x3, 0x4, 0x1000, 0x93, 0x20, 0x20, 0x3}, 0x9c) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000080)={r3, 0x1000, 0x1}, 0x8) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) 23:07:14 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x7b, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:14 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:14 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) sendmsg$kcm(r2, &(0x7f00000058c0)={&(0x7f00000053c0)=@xdp={0x2c, 0xd, r4}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005440)="cf2ae02656b6f168811d35c075d6580d2d0c92dd", 0x14}, {&(0x7f0000005480)="efeb5898abda3b9ad5034b78bf0f6294d433b1139ea768a90a2ce826c08f31e371f50e8ac43210d8aaae9d2667ed6c6b3179c04f57411657d9118dafbfacb1f9e611556311c685214089ab7566ebd0230bf061f4488a3e7c9b158e5a65c75b95e992e1c5dc6c45bf2e58efb022d8217b552293c41e9247496cefd26a556d39af59d5c90f5eb371518f3462ee2e73cbb23c35eaf72270e74218b89cf4f66866effb37af0f7cc2684fd62865ee099c03490a99f5a941cb2d362647eacc09905072680ab894", 0xc4}, {&(0x7f0000005580)="18cd42f433c5716326976c4f64bd6ed430e578ce237938c75fb96107495b449493a0006579ffd61579f6c102883431c4dfff23847013dbc493e40a3cc0ac4e79de38a8ebc42b5bb74b8607cad09f676a04e5afefd7857ca6048a7320e305e7cb3aa201b5e63786b641bf83ec85acb7626fae4f5c9702244213c8b85e3b", 0x7d}, {&(0x7f0000005600)}], 0x4, &(0x7f00000056c0)=[{0x10, 0x1, 0x3}, {0x10, 0x107, 0x1000}], 0x20}, 0x4811) socket$kcm(0x29, 0x7, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r5) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r3, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r6, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:14 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="000000e9fa9bbbbbbbbbffffffffff3fca0cfaf5f96fdd84738e85459d44adfaf15f34f8e6b4d896112761580c969e4f86a35889434b35111f3d63889552ef6e61e6924ad652e5a2cb8ddbc69f7267f92bc735fdd50bea75dc090da2bc0dabd0a94d7960331a76068397c70a32f1deee05cfc11392263af5a01fd94ab87c4ebe7787c9f49bcedd350a865c1bd763066338fd9537bb85fcea1198c41bc1847f1a1593f44c148ce04e13a66a11629913a07e284214ebb4a7d693b0643814741b5814900467218d646e89162633010c2167e964"], 0x19) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000080)) ioctl$KVM_SMI(r0, 0xaeb7) [ 461.628601][T17369] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:14 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x7b, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:14 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400, 0x0) setsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000080), 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f64658c6b3dfff70728"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) 23:07:14 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x7b, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:14 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x7b, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:14 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) sendmsg$kcm(r2, &(0x7f00000058c0)={&(0x7f00000053c0)=@xdp={0x2c, 0xd, r4}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005440)="cf2ae02656b6f168811d35c075d6580d2d0c92dd", 0x14}, {&(0x7f0000005480)="efeb5898abda3b9ad5034b78bf0f6294d433b1139ea768a90a2ce826c08f31e371f50e8ac43210d8aaae9d2667ed6c6b3179c04f57411657d9118dafbfacb1f9e611556311c685214089ab7566ebd0230bf061f4488a3e7c9b158e5a65c75b95e992e1c5dc6c45bf2e58efb022d8217b552293c41e9247496cefd26a556d39af59d5c90f5eb371518f3462ee2e73cbb23c35eaf72270e74218b89cf4f66866effb37af0f7cc2684fd62865ee099c03490a99f5a941cb2d362647eacc09905072680ab894", 0xc4}, {&(0x7f0000005580)="18cd42f433c5716326976c4f64bd6ed430e578ce237938c75fb96107495b449493a0006579ffd61579f6c102883431c4dfff23847013dbc493e40a3cc0ac4e79de38a8ebc42b5bb74b8607cad09f676a04e5afefd7857ca6048a7320e305e7cb3aa201b5e63786b641bf83ec85acb7626fae4f5c9702244213c8b85e3b", 0x7d}, {&(0x7f0000005600)}], 0x4, &(0x7f00000056c0)=[{0x10, 0x1, 0x3}, {0x10, 0x107, 0x1000}], 0x20}, 0x4811) socket$kcm(0x29, 0x7, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r3, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:14 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) 23:07:15 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) 23:07:15 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2f64657647643000c77c85f0057cca0f691697182b63ccfe08bb266d81fc4114a5b8fab4d9658d8acc5ef82b966f5bf62259d7b22baf0a107a720feef28c5492735a2ad1cbac222118b29e431d2b"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') [ 462.375115][T17392] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 462.405406][T17392] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:15 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="850000006d00000025000000000000009500000000000000afcd48d6494d614d1612ba392176dd2963228e1d69ba7ea94c500dc4ef2fad96ed406f21caf593836d9ea2cfb0e60436e054258c4686b066707de94a4f4d5fc79c987d669f2b1faca0f9d9924be41a9169bdfaf16d1c0b153911b8dd7f165789c691de6eee84309e7a23c19a39484809539fca4e0b6ec015a7d55545a34effa077faa55c59e88254f54077f799bf1683537a8ea0244d35b213bda80cc172afd80e361bedd8b8cc57255a5e3d77ac463920e231b7ae0da8616d2b7958f9005d822175ed60ab386d94af98af1da2b59525f8fe3b28d7e53c78fbfe5ab0255f347160ec8343e1494d3a63e57a15cf10453f6c0bb13b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0010f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f132a902e5111f2cc5e46ac1c60a9b10c074bfbcd4b09012175484135f0e519f0b1c4aaa026d570ecb5e8cddbed65ff76ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef479570c8ad943e392957b4f979ea17117a13201bafe4f0f6ea5a6c957ada0c548552b571bed5647223e78a99625bbca4fd91bc404ec13eaa66580ae7b813071cbb17d9f37282462f03de147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb5567e54d3504723177d356c4604b7a492ecec37e83efceefd7ca253cbc8edc8be05cc85451c6a14507434eb54b6f43caea5c4bf690441974b155f5adc6825a3a3d5b754df23175e2ce8b03bf3e3c033e54e4ba9b05292bfdb26f4cd7e166cc384b2845c537b397aaea0eac888419583ccaba598e6d8024920428e070ff941dd7067cb53879c3dbfa852e8fa7aa3d926c6d8aa1f82c76bc59352e82be8e52dce88f66bdb061681fc3b393f75eb23d5c6b4c0ac8ef660a37342f1d9a5d5c14b6b7e8611e5d311a20213ed6ac7b8d66fcc4b7454316338d928b8fff2739e811784d6873207c10ac73e264a6e65bf33020fc466df9ed2764ee2d076e5b68fa1642ebf17caf01bce8e02c31a13ceb7fed854b0625741964fdb2737505f8f584e4c14bd36b9e0608843fc32c6642091765068554ac92b42e467f69b499ecef34d2e6195365822b5577b3dd5f5c3424e7b6faea95c0109873eb52fb8e5a604c8adbf404a4dd79ce8c29f968f56dd583c3e9875678ca16f6b579cde0c1a0ab95f99620e84c0487e6565c04de458761768de308ff95a7189a7731378f0b171f99240f8167693329744d0e41639dca4859753d3"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) 23:07:15 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) 23:07:15 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32, @ANYBLOB='\b\x00\x00\x00', @ANYRES32, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r1, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r3, @ANYBLOB="2871a79e124f36b1447bf3c9cc4cf7216be7524a8dea6f24f1fa5af2f8488da26ae9915049758da85ccaf24b150f8ae6d177809a702d0065a6e1f50104b71eb30cd7cbb3727fea020082b6ed759a78fb855ecc627b33755d5eea2a14a9bb4a3198cdc7af46826f3fa74475b33b48404e64942a7c78658b4c73ee435da12040645c971d79944ae4741d8cfff81bd47445223e45d11d50e93b58e496762dab9ab12b77dd8654b5cb8b7375f3fc65a125a777b8bbe25495bf8828eae6fa2740c9904a86b1119d37deab26b23ee928c82257d5d0193d", @ANYRES32=r3, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r5, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r5, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r7, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r7, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = socket(0x4, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r10, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r10, @ANYBLOB="100006000000000020000000000000"], 0x34, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x2}, [{0x2, 0x3}, {0x2, 0x1}, {0x2, 0x3}, {0x2, 0x4}, {0x2, 0x7}, {0x2, 0x4}, {}], {0x4, 0x1}, [{0x8, 0x3}, {0x8, 0x7}, {0x8, 0x5, r1}, {0x8, 0x3, r3}, {0x8, 0x0, r5}, {0x8, 0x4, 0xee01}, {0x8, 0x1, r7}, {0x8, 0x5, r8}, {0x8, 0xa, r10}], {0x10, 0x7}, {0x20, 0x4}}, 0xa4, 0x0) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:15 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='0dev/nbd0\x00'], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x8, &(0x7f0000000000)=0xfffffff9, 0x4) [ 462.720685][T17402] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:15 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) [ 462.770344][T17401] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 462.794039][T17402] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:15 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f6406002f6e62643000"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self\x00', 0x40400, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 23:07:15 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) sendmsg$kcm(r2, &(0x7f00000058c0)={&(0x7f00000053c0)=@xdp={0x2c, 0xd, r4}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005440)="cf2ae02656b6f168811d35c075d6580d2d0c92dd", 0x14}, {&(0x7f0000005480)="efeb5898abda3b9ad5034b78bf0f6294d433b1139ea768a90a2ce826c08f31e371f50e8ac43210d8aaae9d2667ed6c6b3179c04f57411657d9118dafbfacb1f9e611556311c685214089ab7566ebd0230bf061f4488a3e7c9b158e5a65c75b95e992e1c5dc6c45bf2e58efb022d8217b552293c41e9247496cefd26a556d39af59d5c90f5eb371518f3462ee2e73cbb23c35eaf72270e74218b89cf4f66866effb37af0f7cc2684fd62865ee099c03490a99f5a941cb2d362647eacc09905072680ab894", 0xc4}, {&(0x7f0000005580)="18cd42f433c5716326976c4f64bd6ed430e578ce237938c75fb96107495b449493a0006579ffd61579f6c102883431c4dfff23847013dbc493e40a3cc0ac4e79de38a8ebc42b5bb74b8607cad09f676a04e5afefd7857ca6048a7320e305e7cb3aa201b5e63786b641bf83ec85acb7626fae4f5c9702244213c8b85e3b", 0x7d}, {&(0x7f0000005600)}], 0x4, &(0x7f00000056c0)=[{0x10, 0x1, 0x3}, {0x10, 0x107, 0x1000}], 0x20}, 0x4811) socket$kcm(0x29, 0x7, 0x0) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r3, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:15 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="27337306880f1e8a096dd13146a380eb2cb01c1356f7a90661dff15f85cdde75605cb0f2ffd327244cd1866fc4709cd66b9770aee08208e31a07ac9741f6c126a5a0ed56d58d09d0d297b4fd12644399d3abfa5d761872004d98f249cd244139c7d8cf88bf2d001c9ae68b42b6ff3a0d98cefaef3b90f324b65079ff84dd23847e9655a0ba4d7f3adeafe2f75b60959adb523c53f2afd86d9178d2eb93b4a32f240ec0c8133a0b490373326d8411e722e821fd69f1e69bb06005bc606d4bc8d97d3bd1a0cd08ff06e53c7a80d3ddb277c294d2ea7902a4f9c87be0972fe724484c4d46cb9e95132ff24b313eff1cea0d5fe1a89820fb91d36118c130229671bdbd95117081ea72d90d3cb28d987517cecb37c050571c688b5ff40aca8fadc395541b8f4a0ccc45cf5186754ed29b2673329b29ee90303e05198c5200133f50310d5be41b821a1aef528044186ff7041a7fb9baff1320a26b9a50e48301aee9ec711389cbc439e75fef10c8116ad703df08eb04dddcde473dcc0e81b4d53928c19f5c27cf80fc24d9a0fdee6dda1e464d0646075aeec77784fc0f6b8bb016d754cf7f1770a0ee0d84a126cf05197a5c8ea3f8e39dd8213f92f14c82437f5c383bc6d97386aa7f4354c0784ca85ff9b61958709f8706ec05cb78ba08e5a0eead6f5de353"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r2, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x1000000c8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x6fe4, 0xffff}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={r3, @in6={{0xa, 0x4e24, 0x0, @remote, 0xb8}}, 0x81, 0x8}, &(0x7f0000000180)=0x90) sendmsg$IPSET_CMD_SAVE(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, 0x8, 0x6, 0x5, 0x0, 0x0, {0x2, 0x0, 0x8}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x810) 23:07:15 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2f6465762f6e6271300039cdcd23871085db9186444314770781bf7a7a5c8377100c0d7d90269901c984de619425399ea82866d1a8b28af1fa33054cffbd964ffffad5e93ecdd2c2e94e490e943556a978a535158c161c221b4e0768854b790bba4d81be57db744aa4acb9f81ea143da54540fc65578950dc86ff37599f19d0c8f10adbf0d312f402ef099827363ada471f84e7d685238c3ff41125d72971ff3cf629fd67d37e27fb83ccfbbccd8258029f48b1ec56141d8e9159750b160ba1f8c3ef91cc578af3074f9a773f7f425544c7b816c4b46b8a3ecb7cff563c1"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r3, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x1000000c8) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r4) r5 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000080)=r3, 0x4) write$tun(r0, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) ioctl$DRM_IOCTL_MODE_RMFB(r0, 0xc00464af, &(0x7f0000000000)=0x8) 23:07:15 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:15 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="646575df0a0062456b48"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000000)={0x7b, 0x1e, &(0x7f0000000380)="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"}) 23:07:15 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:16 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="850000006d00000025000000000000009500000000000000afcd48d6494d614d1612ba392176dd2963228e1d69ba7ea94c500dc4ef2fad96ed406f21caf593836d9ea2cfb0e60436e054258c4686b066707de94a4f4d5fc79c987d669f2b1faca0f9d9924be41a9169bdfaf16d1c0b153911b8dd7f165789c691de6eee84309e7a23c19a39484809539fca4e0b6ec015a7d55545a34effa077faa55c59e88254f54077f799bf1683537a8ea0244d35b213bda80cc172afd80e361bedd8b8cc57255a5e3d77ac463920e231b7ae0da8616d2b7958f9005d822175ed60ab386d94af98af1da2b59525f8fe3b28d7e53c78fbfe5ab0255f347160ec8343e1494d3a63e57a15cf10453f6c0bb13b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0010f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f132a902e5111f2cc5e46ac1c60a9b10c074bfbcd4b09012175484135f0e519f0b1c4aaa026d570ecb5e8cddbed65ff76ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef479570c8ad943e392957b4f979ea17117a13201bafe4f0f6ea5a6c957ada0c548552b571bed5647223e78a99625bbca4fd91bc404ec13eaa66580ae7b813071cbb17d9f37282462f03de147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb5567e54d3504723177d356c4604b7a492ecec37e83efceefd7ca253cbc8edc8be05cc85451c6a14507434eb54b6f43caea5c4bf690441974b155f5adc6825a3a3d5b754df23175e2ce8b03bf3e3c033e54e4ba9b05292bfdb26f4cd7e166cc384b2845c537b397aaea0eac888419583ccaba598e6d8024920428e070ff941dd7067cb53879c3dbfa852e8fa7aa3d926c6d8aa1f82c76bc59352e82be8e52dce88f66bdb061681fc3b393f75eb23d5c6b4c0ac8ef660a37342f1d9a5d5c14b6b7e8611e5d311a20213ed6ac7b8d66fcc4b7454316338d928b8fff2739e811784d6873207c10ac73e264a6e65bf33020fc466df9ed2764ee2d076e5b68fa1642ebf17caf01bce8e02c31a13ceb7fed854b0625741964fdb2737505f8f584e4c14bd36b9e0608843fc32c6642091765068554ac92b42e467f69b499ecef34d2e6195365822b5577b3dd5f5c3424e7b6faea95c0109873eb52fb8e5a604c8adbf404a4dd79ce8c29f968f56dd583c3e9875678ca16f6b579cde0c1a0ab95f99620e84c0487e6565c04de458761768de308ff95a7189a7731378f0b171f99240f8167693329744d0e41639dca4859753d3"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) [ 463.413432][T17434] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:16 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'U+', 0xe}, 0x16, 0x2) 23:07:16 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 23:07:16 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) sendmsg$kcm(r2, &(0x7f00000058c0)={&(0x7f00000053c0)=@xdp={0x2c, 0xd, r4}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005440)="cf2ae02656b6f168811d35c075d6580d2d0c92dd", 0x14}, {&(0x7f0000005480)="efeb5898abda3b9ad5034b78bf0f6294d433b1139ea768a90a2ce826c08f31e371f50e8ac43210d8aaae9d2667ed6c6b3179c04f57411657d9118dafbfacb1f9e611556311c685214089ab7566ebd0230bf061f4488a3e7c9b158e5a65c75b95e992e1c5dc6c45bf2e58efb022d8217b552293c41e9247496cefd26a556d39af59d5c90f5eb371518f3462ee2e73cbb23c35eaf72270e74218b89cf4f66866effb37af0f7cc2684fd62865ee099c03490a99f5a941cb2d362647eacc09905072680ab894", 0xc4}, {&(0x7f0000005580)="18cd42f433c5716326976c4f64bd6ed430e578ce237938c75fb96107495b449493a0006579ffd61579f6c102883431c4dfff23847013dbc493e40a3cc0ac4e79de38a8ebc42b5bb74b8607cad09f676a04e5afefd7857ca6048a7320e305e7cb3aa201b5e63786b641bf83ec85acb7626fae4f5c9702244213c8b85e3b", 0x7d}, {&(0x7f0000005600)}], 0x4, &(0x7f00000056c0)=[{0x10, 0x1, 0x3}, {0x10, 0x107, 0x1000}], 0x20}, 0x4811) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r3, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 463.594806][T17439] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 463.643358][T17439] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:16 executing program 2: mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f6465762f6e62643000efe5cc1753c8820983d6a31826313cc1beeed337ad938b1f4007eccae9a16192f4da4627f7fe58e3f316ce9751bf03da"], &(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) fspick(r0, &(0x7f0000000100)='./file0\x00', 0x0) utimes(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x2710}, {0x77359400}}) 23:07:16 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 23:07:16 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='./file0\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYRESDEC=r0], &(0x7f0000000280)='./file0\x00', &(0x7f0000000000)='qnx6\x00', 0x0, &(0x7f0000000100)='/proc/self/net/pfkey\x00') socket$l2tp6(0xa, 0x2, 0x73) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) openat(r2, &(0x7f00000001c0)='./file1\x00', 0x40840, 0x4c) 23:07:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect={0xffffffff}) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x48c800, 0x0) fsconfig$FSCONFIG_SET_FLAG(r2, 0x0, &(0x7f00000000c0)='nolazytime\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x800, 0x1) 23:07:16 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 23:07:16 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) recvmsg(r3, &(0x7f0000005380)={&(0x7f0000004000)=@xdp, 0x80, &(0x7f0000005280)=[{&(0x7f0000004080)=""/4096, 0x1000}, {&(0x7f0000005080)=""/143, 0x8f}, {&(0x7f0000005140)=""/6, 0x6}, {&(0x7f0000005180)=""/238, 0xee}], 0x4}, 0x20d5) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r3, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:16 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="2f6465762f6e62e4305a908a6d75a0812fd300c262b472dbc174923421c6bf6b62cfc2ec6a119e1652399c293771d6d68ae61bc9cf52b97258e8c9a64335787556ec3e1b337b140e8ed4cabfe3ab0f14e7ced4fdce8e4a9b1f359b473206ce27f8c1dbf3cdd59e2aa6"], &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='udf\x00', 0x40000, &(0x7f0000000180)='/proc/self/net/pfkey\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x4e21, 0x28, @loopback, 0x4ed3ccdb}}, 0x0, 0x0, 0x3f, 0x0, "ae832a7b71571d5d16c1b2c5652055cdbe31ad585d874eae34385724c8afbf246b7d23cf7fd5bc91992b16c61fbac4dea1be8bb3d0cbbb1e5d91b7d4d6bd9983a4d9390ce5d6778365ff50556cb79b29"}, 0xd8) 23:07:16 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="0043f40c54014647f500"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x88000, &(0x7f0000000080)='/proc/self/net/pfkey\x00\xa1V(\xa4\xc7\xf1\x01\xbb%w\x8cc\xd6\xe1\a\x89\xdd\x995\xd1\x1e@\xe1\xdf-s\xb7\xf3&f\xe8\\\xc1\xb6-\b\f\x1a\xd09\xb5L\t\xf9\xbd\x8a\x1cbd\xaa\xae\xf9\xb7C\xd5\x97$? \x95K\xcevF\x05\xce7\xc7J\xda2\xe1\xb6\xc1\x8974\x95\"V\x81P@\x86\x15\xe8\xd4y\x8d3\x11|\x84\xb6*\x17}\xf9V\xe3N\xd3\x16\xe3\xeaR\xc59\x8d\xaa\xbbj\x8f\v\xc4\xd9yD7\a\xb6\xb8\x12\xc0\x83 \x18\xce\xb9u\xed\t,i\xffr\x16e\xc7=\xf5Cb\xa5\x92\x98\xe4\xa9\x89\xdc\x83\x14\x8a\xb2\b\xb4Z\x9e\xa6\xfd\xf5G@\xb0\xca@\xbdG\x1a&\xea\xeb\xf0\xe8\xcf\xe12\x98\xb8>\x88f\xee\xb2T\xe4\x97a5\x8c3p\x19;v\xe4U\xb6\xd4\x92') ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @initdev}, &(0x7f0000000180)=0x10) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x18, &(0x7f0000000080)={r3}, 0x8) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) splice(r4, 0x0, r5, 0x0, 0x10005, 0x0) connect$llc(r4, &(0x7f0000000200)={0x1a, 0x30d, 0x3f, 0x1, 0xbc, 0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r3, 0x0, 0x30}, 0xc) 23:07:17 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) 23:07:17 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000008c0)=ANY=[@ANYBLOB="100059e2ab151f2c774843e65d5a3ce551df027d8c97d9b2ab65d8ca901bcb275aca913188454d82df878e67d83d1003c39a674f9155d26039d09a96c4b6173dcab6db641e20243c0e41911ae0576a9539ef51ac106d24f4fb3e8571748505c1beceb19d85dd5e66c2c6f19efa24957958b226e9b079bdaea2fc"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x20020, &(0x7f0000000340)='/proc/self/net/pfkey\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) symlinkat(&(0x7f0000000300)='./file0\x00', r0, &(0x7f0000000880)='./file0\x00') r2 = geteuid() setreuid(r2, 0x0) r3 = signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) close(r3) fcntl$setstatus(r3, 0x4, 0x2c00) r4 = gettid() fcntl$setown(r3, 0x8, r4) socket$inet(0x2, 0x4, 0x400) setpriority(0x1, r4, 0x4) r5 = geteuid() setreuid(r5, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x7, &(0x7f0000000740)=[{&(0x7f0000000140)="3798db77a6d164156c56e8b1a3d1130daea85a223f9ec6b05a9e084405d46f3e480ca90082acaea15596713ff4cbacb174c52c64827313751e2677384ed13c4ef6c952724026bd3ee61f5988f4af49215eb08186f1f6a2e7a05c5aaab886a6033d86", 0x62, 0x1f}, {&(0x7f0000000380)="7922d1deeb32bee4b35990b6b43bd184c34d7ac65e712dbe38cf7045a1222b6a5700c622be3647829fc535cd5a0b635f5a74b03c990f15d5987ff3ec8a71ba617b863f690f3d54c841560843e156742189ebcf743cd0b828ca7a1aef750372b54b0f3cb5dcb1a4e7c9c915b65eb3489222c770d880ccaf43b193adf205b7e38981dcc9f349f0d1e829d93e7feb35734864be4cdaaf9494483c8778768cc01b5955a987966aca982635e509b88941834d89d6a9fe9b3deb7f8bf9d667ca3abd75a78a4ac022b550c8b49381bbaeed", 0xce, 0x98}, {&(0x7f00000001c0)="e8500e9bc6d3ec4c775bd8a0815c9e7e11e1e872e52e4814f3501052384478286ade95cbbb4f16fc24b111b86dea6bd2db3ab2fb8e056cb41b21fc6b8565bbd1b52b1be88a1ac90f81677c5dc280e347269f0d97c02fad603f03301c69c9ff798bcae09280fa18ef93c751d32355a1c29f306dc49d8a8134b78bbac14eed4e3de024", 0x82, 0x8}, {&(0x7f0000000480)="97b19dcd5a48532ad20038b5217ee17e815cacd399d9e599701fc83ccf1b73297ec92cab5305ba25eaa8c006d5b0cd03b5f9240dd9a74b0dce7bb941fd77cd4cfb102325a440b05f70975109a8150569dc343016fd5308a82af87f70881b9656adc3a6449560f303bd55b0b1cbe85ae1b1b5ccdcdb020d9932ab5cba7d7d5d5218da069d18fe59192fd0574c93bd3ee178aea403b8f57af6b7b24d87518531c59622235fe6edd24ba97c5b7b16ed", 0xae, 0x3}, {&(0x7f0000000540)="f615d35de6619de39bdef30feda91cfa2be835389e2f5ea8414147cf39b8acb84a35b967c6cad5a74e07e934b27a3dc77980ff7cc08279205773994b4df7d760dcaaceed3fab2ef52f50aed95c99ad80ab32f139b4c30e6b7cadf9fb1278fc3f87078cfa4345d9d84ce9397e477f6b0ae15b845fa6ec2247337acd9e2e06c6ba69da52a4dd944a788f12488af463344b2d708c63d6be9b9772985738ca8560f65d697ad98a86c70c1aca507919ea0cc7a23ad17240", 0xb5, 0x7fff}, {&(0x7f0000000600)="271044a3a5976a48b669af72dcbe7ba816cdaceb3773712b47f0f0c5c21065b4b631ac4795a0a746e30caf16938a00440ece511cafdbc16bd6c8d5d3bb9c3f21be9cd26c5e4580e326b5d462c6cb7446a3ac06beca67dfa2108b3fe02bd752d5fba37c133844d364034bf4b89c1f70ba154a365b17a2d9abf91ebb4157f986eabfb5f0e45e95487cd2901d7b24aa03bae14332b7e581e9cdb09aa94a", 0x9c, 0x80000001}, {&(0x7f00000006c0)="0d213eded87afd147559d4f8df86aea69991047586398cec6a9bb0486a836c2565f126e73b36c6421e71515c677d080bc0687a1eccad469e034b435082890d9599bd0669c3cc203008d598dfa94a873c7b1240a746ed984bad26ec84e5ac", 0x5e, 0x1ff}], 0xa38, &(0x7f0000000800)=ANY=[@ANYBLOB='a\x00\x00\x00\x00size=44,qnoenforce,obj_user=udf\x00,subj_role=udf\x00,uid=', @ANYRESDEC=r2, @ANYBLOB=',fowner<', @ANYRESDEC=r5, @ANYBLOB=',mask=^MAY_WRITE,\x00']) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000080)={0x20, 0xffffffffffffffda, 0x5}, 0x20) 23:07:17 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="3f6465762fde2eabc23cdbf799"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:17 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, 0x0, 0x0) 23:07:17 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x1010000, 0x4) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = signalfd(r4, &(0x7f0000000040)={[0x5]}, 0x8) close(r5) fcntl$setstatus(r5, 0x4, 0x2c00) r6 = gettid() fcntl$setown(r5, 0x8, r6) setpriority(0x2, r6, 0x200) 23:07:17 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) r0 = socket$netlink(0x10, 0x3, 0x8) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000080), &(0x7f00000000c0)=0xc) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x10000, &(0x7f0000000340)='/proc/self/net/pfkey\x00') [ 464.811307][T17489] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:17 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) utimensat(r2, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{0x77359400}, {r3, r4/1000+10000}}, 0x100) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') [ 464.905317][T17492] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:17 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="850000006d00000025000000000000009500000000000000afcd48d6494d614d1612ba392176dd2963228e1d69ba7ea94c500dc4ef2fad96ed406f21caf593836d9ea2cfb0e60436e054258c4686b066707de94a4f4d5fc79c987d669f2b1faca0f9d9924be41a9169bdfaf16d1c0b153911b8dd7f165789c691de6eee84309e7a23c19a39484809539fca4e0b6ec015a7d55545a34effa077faa55c59e88254f54077f799bf1683537a8ea0244d35b213bda80cc172afd80e361bedd8b8cc57255a5e3d77ac463920e231b7ae0da8616d2b7958f9005d822175ed60ab386d94af98af1da2b59525f8fe3b28d7e53c78fbfe5ab0255f347160ec8343e1494d3a63e57a15cf10453f6c0bb13b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0010f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f132a902e5111f2cc5e46ac1c60a9b10c074bfbcd4b09012175484135f0e519f0b1c4aaa026d570ecb5e8cddbed65ff76ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef479570c8ad943e392957b4f979ea17117a13201bafe4f0f6ea5a6c957ada0c548552b571bed5647223e78a99625bbca4fd91bc404ec13eaa66580ae7b813071cbb17d9f37282462f03de147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb5567e54d3504723177d356c4604b7a492ecec37e83efceefd7ca253cbc8edc8be05cc85451c6a14507434eb54b6f43caea5c4bf690441974b155f5adc6825a3a3d5b754df23175e2ce8b03bf3e3c033e54e4ba9b05292bfdb26f4cd7e166cc384b2845c537b397aaea0eac888419583ccaba598e6d8024920428e070ff941dd7067cb53879c3dbfa852e8fa7aa3d926c6d8aa1f82c76bc59352e82be8e52dce88f66bdb061681fc3b393f75eb23d5c6b4c0ac8ef660a37342f1d9a5d5c14b6b7e8611e5d311a20213ed6ac7b8d66fcc4b7454316338d928b8fff2739e811784d6873207c10ac73e264a6e65bf33020fc466df9ed2764ee2d076e5b68fa1642ebf17caf01bce8e02c31a13ceb7fed854b0625741964fdb2737505f8f584e4c14bd36b9e0608843fc32c6642091765068554ac92b42e467f69b499ecef34d2e6195365822b5577b3dd5f5c3424e7b6faea95c0109873eb52fb8e5a604c8adbf404a4dd79ce8c29f968f56dd583c3e9875678ca16f6b579cde0c1a0ab95f99620e84c0487e6565c04de458761768de308ff95a7189a7731378f0b171f99240f8167693329744d0e41639dca4859753d3"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, 0x0, 0x0) 23:07:17 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000a80)="2e0000001a71a28e15b92c008125e00f80ecdb4db90202000004a1dc5f09850869551200010004001100"/52, 0x34}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r3, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 464.992946][T17497] bdev: Unknown parameter '/proc/self/net/pfkey' [ 465.028202][T17499] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:17 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=""/78, 0x4e) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) [ 465.047157][T17497] bdev: Unknown parameter '/proc/self/net/pfkey' 23:07:17 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) ioctl$VIDIOC_G_DV_TIMINGS(0xffffffffffffffff, 0xc0845658, &(0x7f0000000080)={0x0, @bt={0xfffffffa, 0x9, 0x0, 0x0, 0x5, 0x4, 0x5, 0xfffffc00, 0x80000001, 0x6, 0x101, 0x81, 0x7e, 0x2, 0x0, 0x20, {0x3, 0x8}, 0x9, 0x2}}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000000)) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') [ 465.121407][T17505] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 465.211219][T17508] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 465.291307][T17511] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:18 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) write$cgroup_int(r1, 0x0, 0x0) 23:07:18 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/10], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') r0 = geteuid() setreuid(r0, 0x0) r1 = geteuid() setreuid(r1, 0x0) r2 = geteuid() setreuid(r2, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x101, 0x8, &(0x7f0000001580)=[{&(0x7f00000000c0)='a', 0x1, 0x100000001}, {&(0x7f0000000100)="bbe2227b148e955ea39787b34a9592807e900b81931326f12bce9516eeb25c1e33fee12a90e39c1461d07ce704331523acdf760887687d4695f9302f278a4cd6052ae722ed870cc1166bbe378b680c095d4ad59cfd6f1aacc243", 0x5a, 0x7}, {&(0x7f0000000180)="821b5ccaaf0d2e596b613d79fb243341b94d5a53a6904da8b285ff51b73f24e388752a9f4563306e81f7823ee8baddfd8cee29fb1827f0f943158ba72b3d532a1a09723443751200c28727c7d8ac7a566ea649daa6042f3610f593594ced99bbbaeff1f045ca6bc47c8307079699f62a6dfe50e106bb5a24888e5949658695a76cd3810221eaa2bda3a055f4df1643e3ab2047a0", 0x94, 0xec6}, {&(0x7f0000000300)="5001bec90fdd7204cbe68fb81ab5901e9ceab8f40788357c01899cf6faaf4efb460da67fa548c94aa09585d6be7303973111ee57117bd92a", 0x38, 0x7}, {&(0x7f0000000380)="bb7d77eef400acdf2b441e9e8fc990218ce503100e14ec6b685df89c50d32032af816b2880710b451586fe24aabcccec27d949993e9130e294629a984e93408ea6a2d9d5580e3ac58cb361dfd8615ad3eaa474b9b60673e5a0c8578681a86ac79266244546589bf3c0abfcd00cf7d5f9be789e70d2a1011ec257245ae074d74c14a9e183ce555dc4b51018ff1b10341cd001fe32c72b8bead8f73b26ab2a636df0b4a48c505db622c3ecfb9b0b991e2a03d8b521365d8755e968d0ea83a469f8b14993813636170f177dde87615ad54eb451c85ae9d817135319f94df95cfd6abcd4fb52dcc8e30939575eb2719176e72e74c8a01fa572cbf5", 0xf9, 0x24000000000}, {&(0x7f0000000480)="c51a4018e738818f4c54ad8f7bffe458f277f09d010d7208216c9516e2b17c48c8258c23a282c90cf5804f9a68b3b22d1177a9148432374055933a986f280a5bd82bc4ce74cdf7f532167f53c755b153814fdde076b80c21ad920f00eba7a9f0cf5bdca38e80a6b73316be0c1176d1f0b1f9e143c7b5a083effcc78e1e981952fbb9cc9c500f4d1bc286975a70fc8056632fdd21fced125ec29eff6dc8", 0x9d, 0x7afc85c0}, {&(0x7f0000000540)="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", 0x1000, 0xffff}, {&(0x7f0000001540)="c92bd05950d9dfa24316a9459ef43829b1edbfa69d1f34be3f4f15170acf60f885d445", 0x23, 0x20}], 0x202008, &(0x7f0000001640)={[{@meta='meta'}, {@loccookie='loccookie'}, {@statfs_percent={'statfs_percent', 0x3d, 0x6}}, {@localflocks='localflocks'}], [{@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_lt={'uid<', r0}}, {@obj_type={'obj_type', 0x3d, '/proc/self/net/pfkey\x00'}}, {@measure='measure'}, {@appraise='appraise'}, {@uid_lt={'uid<', r1}}, {@euid_gt={'euid>', r2}}]}) [ 465.392638][T17512] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 465.498277][T17516] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:18 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r3, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:18 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2f6465762f6e62643000a0b5c78405f8d1739bff76266ae84d3ae6ed1f3694fd33b0bf855bbddb13c4d7a028133416f3fa2a15125c129916000332e90152d30f2d35b8c211bb4ea1b21272be583af8f02b57c4998fb2ed3a90dd7c97af72b3965f30b4d9006a4c6c8942c3b79bdbba08e252ba274c3036fc7fbc78d62b5d11f77e225eeb218b010000009a261108ff611fca"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:18 executing program 1: 23:07:18 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES16=r0, @ANYBLOB="15830040edffffff00006b000000080017"], 0x3}}, 0x0) setxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='security.evm\x00', &(0x7f0000000380)=@sha1={0x1, "8839b17cad26e20015ecfbbf22e0fac7a173fc33"}, 0x15, 0x1) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x28, r0, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x1}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac05}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x10040000) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x2, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dlm-control\x00', 0x82280, 0x0) getsockname$packet(r3, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14) bind(r2, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="34a612cf6a104be5a80bc25d7791c53800000010", @ANYRES32=r4, @ANYBLOB="00000000000000001800168014000180100002000f10ffff0000000000000000"], 0x38}}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r0, 0x800, 0x70bd29, 0x25dfdbfb, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x7, 0x2}}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x20000) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) splice(r5, 0x0, r6, 0x0, 0x10005, 0x0) ioctl$FS_IOC_SETVERSION(r6, 0x40087602, &(0x7f00000004c0)=0x2) [ 465.868511][T17530] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:18 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000000)=0x5c6) 23:07:18 executing program 1: [ 466.053548][T17534] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 466.178451][T17534] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 466.219168][T17538] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:19 executing program 1: [ 466.285727][T17538] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:19 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2fc24fda5a0e35e4f26465762f6e62641dc59dd69a"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:19 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008103e00f80ecdb4cb90202000004a1dc5f09850869556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r3, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:19 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='/de\x00'], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000080)=0x14) 23:07:19 executing program 1: 23:07:19 executing program 1: 23:07:19 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000002c0)={0x1c, r2, 0x301, 0x0, 0x0, {0x7}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r2, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}]}, 0x2c}}, 0x50) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:19 executing program 1: 23:07:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="91829ae1216125abe3762691a762e5d3a589f5b8153f057db352bb4c905b94836d9634ca511682dc3186cf8bd1b4f22e04c0a40bd2bd11a921edaf16c10960bd367a986f0549f85c3a"], &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 466.986861][T17558] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:19 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:19 executing program 1: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setresuid(0xee01, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000095c0)=[{{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f00000000c0)=""/208, 0xd0}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(r0, &(0x7f0000000500), 0x5d, 0x0) 23:07:20 executing program 1: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setresuid(0xee01, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000095c0)=[{{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f00000000c0)=""/208, 0xd0}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(r0, &(0x7f0000000500), 0x5d, 0x0) 23:07:20 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) sendmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)}, {&(0x7f0000000380)="efa5b09e27bbf3b220d5ed070af856fff7f61614ab4e9b9550712d2a3c88cd7e83a90c34fdf5166826bab963a27ac5563b903400dab857e5e23f5e547f8ed450245c592edac29da075df0f03f973d7602ef1642776e9af14f49525727b57a24c0e76ed1be797c45dd60635ad4f797b0888d2b909baf9a30751b405d6d53a53b42d726de2ebf53e16d7f4a8edcf80aa7af0cf2fc62d1c11d0458f542a2c085b11a666d0bbf3e81b21ad95c43a821c16178e294d54fbb8bc2604fed42608bc6799690c78", 0xc3}, {&(0x7f0000000480)="2c8a27e896aae1d83531b87d7beee090a96482fa4a6d4ef59f541002a573e4bf940fb44415b86f630853fc79ebb73e998583deea566ef4e8048cdd583c0a3655ef8deb2ca306683ed440abc92dcd84d31e3de4e3048966b885872dc810bf6fc421aa0ad3842261ca62672f03c236357f7e9c6ce4360dbee48a1bd6aa243d03849d285b3736", 0x85}, {&(0x7f0000000180)="d6fb62dde92ace87", 0x8}, {&(0x7f00000002c0)="eec1ede1effb63fa8cde919c0e0185a19a92ffd635101e87a84cc3d14e9364f8b86ee0", 0x23}, {&(0x7f0000000900)="0d5d905111883f0efb0fda8cbf66dedba91f231bc444c756bd38ab4088113e98ecd7415430ed0bdf649e4b4ce15cbac83f2eca2cb1d86e8868a8d5b4a655b1d1b6e8d3bca4ee2d4bbfb85c0d2aaedc8d160e54fea3bdda4f10940652907d4ec67640cbef9aca10e2540f342238f652b49ca608bf559428737cfca9d7be36dc67f82ecc3fc37e4c116c8004bb52f79e9562513e0f4f35be60f09840078a5d26dd722e4104ba81ab51c1b8197a5ecf62fdc1bf3e2d1f42617dd0b41fe838bf77d19f25177aa102d0a8e77fb699b1eb47384379ec4d93524df90110c235cc78bf70e67d60d25905a27fa14d2388", 0xec}, {0x0}, {&(0x7f00000001c0)="8a427fc0af54d11660ba5a0942835262a26fb960e813a8adc0a12766e25f809da3953579863bc543db557b79973701c2b79de5c4f47c", 0x36}], 0x8, &(0x7f0000000600)}, 0x4000804) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) close(0xffffffffffffffff) socket$packet(0x11, 0x0, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000640)={0x1, 0x0, [{0x0, 0xcd, &(0x7f0000000240)=""/205}]}) 23:07:20 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000380)=0x5, 0x4) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000100)="8a182e45e53a8786ba8b3fd267a20a923c51e0c97e911735133eb918eebdc9e24bda7830899d365ff3c2352dcd5c8e38511a263fbf42fd527323d9a7320557cab2c3d66c80a871ef6797090b1f423087ba8ed80c53d12db1d4c023babe30c33f0e2146aaa73b17b8eae645584339efde539a0877880ec5225c6fb7009e822d69781a39a2bef8fffc5afc240c0a13d39946bec07fbdd50cf910576ae6bd56a97d9efb1e763c70aaf1a5039f8da673e0be1aede6b8f9f5dcc043596f6ff8061e44eb6bba1a0cc6895343aa8c8b53a3cb6e", 0xd0, 0xfd}], 0x1000, 0x0) mount(&(0x7f0000000240)=@filename='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000080)='ecryptfs\x00', 0x2000000, &(0x7f0000000340)='\xafProc/ey\x00'/21) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') setxattr$trusted_overlay_origin(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000440)='y\x00', 0x2, 0x1) [ 468.029446][T17582] ecryptfs_parse_options: eCryptfs: unrecognized option [¯Proc/ey] [ 468.058266][T17582] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 23:07:20 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) fcntl$setlease(r2, 0x400, 0x0) r3 = socket(0xa, 0x5, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) r5 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(r4, r6) truncate(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setlease(r2, 0x400, 0x2) [ 468.144851][T17582] Error parsing options; rc = [-22] [ 468.258535][T17582] ecryptfs_parse_options: eCryptfs: unrecognized option [¯Proc/ey] [ 468.273152][T17582] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 468.313909][T17582] Error parsing options; rc = [-22] 23:07:21 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x1}}, 0x80, 0x0}, 0x40050) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UDMABUF_CREATE(r1, 0x40187542, &(0x7f0000000000)={r3, 0x40001, 0x8000, 0x1000000010000}) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="10b3c6fc75f890889395e2d86c5ca10e4d233744e70c56c2a1c47d44aea4d111b2532d669d5b22a9948bcb7cfe0100000000000000fe70cdc3d10e5c3ad3ef0ee06f11e496e4d4601764a1d208c42a71fa5092a5a27e557080af29c4ce9824803f750c26d7f8f54bd8ec8d1d224ca2e49c0bbf55"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:21 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) fcntl$setlease(r2, 0x400, 0x0) r3 = socket(0xa, 0x5, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) r5 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(r4, r6) truncate(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setlease(r2, 0x400, 0x2) 23:07:21 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000080)=""/122, &(0x7f0000000000)=0x7a) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') [ 468.732978][T17607] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:21 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) fcntl$setlease(r2, 0x400, 0x0) r3 = socket(0xa, 0x5, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) r5 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(r4, r6) truncate(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setlease(r2, 0x400, 0x2) [ 468.791915][T17609] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:21 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000000)=0x3) 23:07:21 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 469.031867][T17615] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:21 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) fcntl$setlease(r2, 0x400, 0x0) r3 = socket(0xa, 0x5, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) r5 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(r4, r6) truncate(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setlease(r2, 0x400, 0x2) 23:07:22 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) fcntl$setlease(r2, 0x400, 0x0) r3 = socket(0xa, 0x5, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) r5 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(r4, r6) truncate(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setlease(r2, 0x400, 0x2) 23:07:22 executing program 0: socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x11, 0x2, 0x0) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:22 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="5cf6e5c832011717b3c9125746c9d0bb5bdc3431a3070d26146a19d221a4aca4bc5644335092cabea9b47da2bf20c72fb8a80cb0772da2ddbfc0c92649a15ce06ec91e21ee1314e4ec2d788b8f948ba19e55093f4d3ebe71f89be5216a7635756ef5588d2e0cc60efcb341069265b64651a0620ff6c55d7b89c78701a5d9d9218400d2bdf8489c1cf5efa17ccfd5ac8c2097166137eb7c8896"], &(0x7f0000000280)='./file0\x00', &(0x7f0000000000)='jffs2\x00', 0x100054, &(0x7f0000000140)='/Proc/selfEnetkey\x00\x00\x00\x00\xef\xa1K\xfe\x02\x86\t\x00\x00\x00\xfb\xdd\x1a\xc0\t\x00\xc3\x01+\xf0u\xe21\xd6\x00\xe9\xbc\xccG@\xaa\x98A\xef/\x87O\x8a\x9erf\xa9*E\xd1\xafeI\xd8{e0F\x02\xfb\x85\xc66\x8ba\xbc\x8b4~\xa8\xadFni\x0e\x06\x14\f(,\x86\x19\xe7~PO~\xde\xe8\xeb\x19\xe6\x9d\v\n\x00\x00\x06\x00'/126) 23:07:22 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) fcntl$setlease(r2, 0x400, 0x0) r3 = socket(0xa, 0x5, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) r5 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(r4, r6) truncate(&(0x7f0000000040)='./file0\x00', 0x0) 23:07:23 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000080)={0x0, 0x1, &(0x7f0000000200)='S'}) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f6439b8e52d5b6865762f6e624d78ecb117643000"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x2, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x18, &(0x7f0000000080)={r4}, 0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={r4, 0x1, 0xab3, 0x6, 0x7, 0x3ff}, 0x14) 23:07:23 executing program 0: socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x11, 0x2, 0x0) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:23 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f6400000000e2a72d656e62643000"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:23 executing program 5: prctl$PR_SET_SECUREBITS(0x1c, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) fchmodat(r0, &(0x7f0000000000)='./file0\x00', 0x38) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$netlbl_unlabel(0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000040)=ANY=[@ANYBLOB="c800", @ANYRES16=r4, @ANYBLOB="00022abd7000fedbdf25040000002b00070073797374656d5f753a6f626a6563745f723a7373685f6b657967656e5f657865635f743a733000003300070073797374656d5f753a6f626a6563745f723a756e636f6e66698a65645f657865636d656d5f657865635f743a73300000080005007f00000114000200ff010000000000000000000000000001080005000000"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$NLBL_UNLABEL_C_ACCEPT(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x18020000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="100026bd7000fddfdf25010008000000000000000000ae008d184a"], 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x840) [ 470.814421][T17644] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:23 executing program 0: socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x11, 0x2, 0x0) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:23 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:23 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='sockfs\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') bind$ax25(0xffffffffffffffff, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5}, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) 23:07:23 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) fcntl$setlease(r2, 0x400, 0x0) r3 = socket(0xa, 0x5, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) r5 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(r4, r6) [ 471.109645][T17655] sockfs: Unknown parameter '/proc/self/net/pfkey' [ 471.132935][T17654] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 471.144792][T17655] sockfs: Unknown parameter '/proc/self/net/pfkey' 23:07:23 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) fcntl$setlease(r2, 0x400, 0x0) r3 = socket(0xa, 0x5, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa) r4 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa) 23:07:24 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f308e352aa09d589852d5295101244d23b9000000000000740fa007308b3beb53"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:24 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='d0\x00'], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000000)=0x101, 0x2) 23:07:24 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2f6465762f6e6264300097d04850b4301640d2f97389d3a595222d70cd2cfcfe3e00b6618ac687118b91587560a9fc33de6afc2f1119310370b84c52a827f91904e0becb0d5f"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000000)={0x9, 0x1}, 0x2) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x1) 23:07:24 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) fcntl$setlease(r2, 0x400, 0x0) r3 = socket(0xa, 0x5, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa) socket(0xa, 0x2, 0x0) 23:07:24 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:24 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) fcntl$setlease(r2, 0x400, 0x0) r3 = socket(0xa, 0x5, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa) [ 471.730756][T17672] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 471.804485][T17672] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:24 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) fcntl$setlease(r2, 0x400, 0x0) socket(0xa, 0x5, 0x0) 23:07:24 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000000)={0x401, 0x47504a50, 0x0, @discrete={0x3}}) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:24 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) r0 = geteuid() setreuid(r0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x18, &(0x7f0000000080)={r6}, 0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000140)={r6, 0xfffffffe}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000001c0)={r7, 0x9, 0x4000}, &(0x7f0000000200)=0x8) write$tun(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="bbbbbbbbbbbbff1f0000000f0d00000000000000004445ca0c682c075e2625e9b2fea99703f394a32baaa3245c0130eaa5c6f0cce416338de9a39211590d83f186a708cf9fa5b7331634dac85f207df8bac94f8b5b03895b359e0c44568760811b23eb02fe572202f15b50e221a739eae4dfaf2db970a6f209b775d56e11d8592a36a1f2"], 0x15) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000100)) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) setxattr$security_capability(&(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v1={0x1000000, [{0x2, 0x9}]}, 0xc, 0x3) mount(&(0x7f0000000580)=ANY=[@ANYBLOB="2f6465762f6e62643000d0ab98cf557a4ab1fd95732bf0ef5ba1258df5a7de0a68e44b6497ef6a16e900ab37db7a23242068e07a80c5a7e59e11e6e8731ea1f1b2e007be164b9b466edae859eb71b17723324525ee5ac4edece10c2db808651f9939467b5ba5c2fcedc129d7d20fa4a9e419c2c9ddde0139b8fbb93e8851da5c32562657fada094af20c1ba505f8ea2385e06aea2acaee8186cb3f9080f7b6c0a101911731d7037c0baa148a7c5789814e01cbbe315e46393b1d959562e9a2c81dd3de9f627588fb27803573e8cf65c1506c9fb1f7c2c6ada0cca1a4b7b709631145060fe2ca71ae06c5d087b59964329da319d8bb87eb92367ebffcf9a9e1332dbe846ccd9a0d17cbb49ce38504eab70e08f0b8a6efda0170b91faf35da8f65f33b40938162a1ce3e27fc924362c477e32f6ffe0a4afc83ac5c7e"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') [ 472.178634][T17685] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:24 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:24 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) fcntl$setlease(r2, 0x400, 0x0) [ 472.246040][T17687] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 472.300830][T17690] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:25 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) 23:07:25 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x5) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) 23:07:25 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:25 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x18, &(0x7f0000000080)={r5}, 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000000)={r5, 0x7fff, 0x80}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000000c0)={0x0, 0xf8, "ee2aa6a16f4cb758a150809743beea523cc791084fd7246eea2d5123e297935e3e7dd390b16d3718c0a70223756a6b3f7777d2265e01ad4c59406a2fe67cf26d4badb4f74092c6462a0a059e5ef795f2779b7b985c9dcc12f009408739eb6d3a55d6dc4e479d3612f23450e8ceb1ef98d74138a0c8180b0f3fad5b187427edcfd0196e8b57f3777f23454b42e056d9680a7562ffbbaea97ae258c13084b1ff416334fa74003a4deedfad107c51ba986214321a0b3fa136478caf9f2499e18305c6aa117c436d9ee8df0f0820a6bfc71d53a704c996993f8b554224e3d186f5f3b1eeeae5b6bd7b41ef60a4b354d5708229643d3f43ebbea2"}, &(0x7f00000001c0)=0x100) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f6465f62f6e6264303a"], &(0x7f0000000280)='./file0\x00', &(0x7f0000000200)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:25 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='/dev/d0\x00'], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:25 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x5) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) 23:07:25 executing program 2: fchmodat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x20) 23:07:25 executing program 0: r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)=r0, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:25 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x5) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) 23:07:26 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="c0ff65762f6e62643000"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) r1 = geteuid() setreuid(r1, 0x0) r2 = geteuid() setreuid(r2, 0x0) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x7f, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000100)="cfdc3f6283f30b86a90b3657fe6651aeb49b912bc56a07303f073753719ae8eac274213d9fecaa9f08611107c05ff0afddbc675e3763356041d9cfce7256951419062cbbdaa2b793fbba36769107deb95bd79a363613c302aad9dd53b181fad58c79c5a5c7fbea93b94088b330f6af1884e188fce49c6ad31c60cf8bf02c766ad656afa41d70c0e9b5d59aacb4b42c186690619880556ad3ddb12b46fec4e6e292e6cb6f", 0xa4, 0xa0}, {&(0x7f00000001c0)="3dd49dc4", 0x4, 0x3f}, {&(0x7f0000000380)="62b09696c02177e5120da4e8c0708652731af1b6a3f0f07a64cebf252c0d8b0e2ef709b60de6fd719af36679ab8988391f8f07f3b98c2dd23fc8fb8ff41600572f2bd1", 0x43, 0x80000001}, {&(0x7f0000000400)="81d91ed3cdaa7f2e878bc1996804f6c9eaa43a3815316269851982d150aed94011c4696f1f548fa03f6ab0d97bf53f1d927742724ab39ae3de6d10316da6ba1f5bd5a53dcb6e24bbd97c21032019bd5215e5d5480fa5f2eb56075d7a8aafdc7282f1e84e12f9e2e125e54474cb561f7533bfd4b822fbd8e637353ca20d10f1fdb899edcab6efda7caef083b1f6cc1261d7555ea7ef10fa6e48f188c59c40b3b7ce99e4d1d89c6905d635d8f97b1bde8579c0", 0xb2, 0x4}, {&(0x7f0000000200)="bd933370fa26985ffb0a81617674ff01e59835c902db", 0x16, 0xbde5}], 0x1400, &(0x7f0000000540)={[{@balloc_test4='block-allocator=test4'}, {@errors_ro_remount='errors=ro-remount'}, {@data_ordered='data=ordered'}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/security'}}, {@uid_lt={'uid<', r1}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}, {@obj_type={'obj_type', 0x3d, ']-]!wlan1GPLnodevppp1vboxnet0bdevwlan0posix_acl_access%self{ppp1(nodevvboxnet0'}}, {@measure='measure'}, {@audit='audit'}, {@appraise='appraise'}, {@seclabel='seclabel'}, {@euid_lt={'euid<', r2}}, {@smackfstransmute={'smackfstransmute', 0x3d, '%^vboxnet0vmnet0'}}]}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x2, @empty}}, 0x1e) 23:07:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 23:07:26 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) socket(0x1, 0x5, 0x0) setresuid(0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) 23:07:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="68000000100005070000f9bbc7e4b627ef400000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="b1095fdfe8d99b634415afcd2d83413c5068820300baca9e5914fbbcedb810a608c14c8df202ec012aae962f6bd03031e0f12428a3da8fd0c1b03ae88a37621399519fed5f5d96fc9c433a3320dd08d1524c0e4ab489efa5f7572479fe854a"], 0x68}}, 0x0) 23:07:26 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) socket(0x1, 0x5, 0x0) setresuid(0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) [ 473.671644][T17729] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 23:07:26 executing program 0: r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)=r0, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:26 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) socket(0x1, 0x5, 0x0) setresuid(0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) 23:07:26 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) 23:07:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000080)={'nat\x00', 0x2, [{}, {}]}, 0x48) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:27 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) 23:07:27 executing program 0: r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)=r0, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:27 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) 23:07:27 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="8da0250192f09c09c7e728d49230538d393e88d00380c12e076f8f47693b61dad524e3edc46522d1fd57c6524c4f25a7d22c25c70c6cfeaf67f7ec2ad090f7e882a01c83a962e1e3ae8e29ec71f59811d463cca26b2d814f486166bf58777019c6411491b937251516a564859e41cf82463e89e46a4ee46a332f8364b0f7ac63ba3a"], &(0x7f00000006c0)='./file0\x00', &(0x7f0000000b00)='nfs\x00', 0x0, &(0x7f0000000000)) [ 474.773802][T17752] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 474.840261][T17755] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:27 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xe0, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2, 0x0, 0xa}, [@CTA_PROTOINFO={0x30, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0x2c, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_ORIGINAL={0x6, 0x4, {0x9, 0x20}}, @CTA_PROTOINFO_TCP_WSCALE_REPLY={0x5, 0x3, 0x6}, @CTA_PROTOINFO_TCP_WSCALE_REPLY={0x5, 0x3, 0x3f}, @CTA_PROTOINFO_TCP_FLAGS_ORIGINAL={0x6, 0x4, {0x3f, 0x1f}}, @CTA_PROTOINFO_TCP_WSCALE_REPLY={0x5, 0x3, 0x1}]}}, @CTA_SEQ_ADJ_ORIG={0xc, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x5}]}, @CTA_HELP={0x10, 0x5, 0x0, 0x1, {0x9, 0x1, 'syz1\x00'}}, @CTA_TUPLE_REPLY={0x44, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, [], 0x3f}}, {0x14, 0x4, @local}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x1002}, @CTA_SEQ_ADJ_REPLY={0x34, 0x10, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x100}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x1}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x3}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x5}, @CTA_SEQADJ_CORRECTION_POS={0x8}, @CTA_SEQADJ_OFFSET_BEFORE={0x8}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x810}, 0x1) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2f73cd762f6e626430af742187eb9400"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r1, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) ioctl$TCGETX(r1, 0x5432, &(0x7f0000000080)) 23:07:27 executing program 1: r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) 23:07:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e198b19b06cccc9ac5e3ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688a5622355131228c09debd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e"], 0x18}}], 0x40000000000037b, 0xc000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e953ac2d080872df2439c6d39f0825e35fea624c98a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f100000000000000"], 0x18}}], 0x40000000000037b, 0xc000) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r5, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf00a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a722d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b0affffffffffffffc2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}, 0x2000000}], 0x40000000000037b, 0xc000) 23:07:28 executing program 1: r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) 23:07:28 executing program 0: r0 = socket$kcm(0x11, 0x0, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:28 executing program 1: r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) 23:07:28 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0x0) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) 23:07:28 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='efs\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 23:07:28 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0x0) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) 23:07:28 executing program 0: r0 = socket$kcm(0x11, 0x0, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e198b19b06cccc9ac5e3ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688a5622355131228c09debd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e"], 0x18}}], 0x40000000000037b, 0xc000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e953ac2d080872df2439c6d39f0825e35fea624c98a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f100000000000000"], 0x18}}], 0x40000000000037b, 0xc000) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r5, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf00a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a722d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b0affffffffffffffc2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}, 0x2000000}], 0x40000000000037b, 0xc000) 23:07:29 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0x0) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) 23:07:29 executing program 0: r0 = socket$kcm(0x11, 0x0, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:29 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) open$dir(&(0x7f0000000000)='./file0\x00', 0x50000, 0x78) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:29 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x0, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) [ 476.859087][T17809] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:29 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 476.946493][T17813] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:29 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x0, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) 23:07:29 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000bbbbbbbbbbbbff010000000000000000080500000032f7c640c1b80e423a65befdaeca6187d06562094f55f6fe391ee04e35ef8b38df2db0f1732b64289819c85c4114529ccf857e48c83619ec97b2e91e6cb6cf799160b0d641d3c3871d48dcfd3320ed8ebe8f8e24ace1b2dd977e9dad9ccd325b0040bcdb16119538efe7ca0874274d3f50ab011ba574fab29ea561be198591edfd725d335ff98f20fb543d865fd2d7d4ad3c7bc5c238c27c621c8759eefa1a0e2148dfb794ed3ff0430e4036e63811dc6456c0d61b921fc94c267053afa82977a90141"], 0x19) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000000)={0x6, 0x7, 0xfffffffa, 0xfffffff8}, 0x10) 23:07:30 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x0, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) [ 477.400093][T17824] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e198b19b06cccc9ac5e3ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688a5622355131228c09debd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e"], 0x18}}], 0x40000000000037b, 0xc000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e953ac2d080872df2439c6d39f0825e35fea624c98a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f100000000000000"], 0x18}}], 0x40000000000037b, 0xc000) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r5, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf00a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a722d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b0affffffffffffffc2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}, 0x2000000}], 0x40000000000037b, 0xc000) 23:07:30 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:30 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) 23:07:30 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:30 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) 23:07:30 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:30 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) [ 478.465753][T17846] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:31 executing program 0: socket$kcm(0x11, 0x200000000000002, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)=r0, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e198b19b06cccc9ac5e3ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688a5622355131228c09debd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e"], 0x18}}], 0x40000000000037b, 0xc000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e953ac2d080872df2439c6d39f0825e35fea624c98a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f100000000000000"], 0x18}}], 0x40000000000037b, 0xc000) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r5, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf00a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a722d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b0affffffffffffffc2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}, 0x2000000}], 0x40000000000037b, 0xc000) 23:07:31 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) socket(0x1, 0x5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) 23:07:31 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) getpeername(r0, &(0x7f00000001c0)=@nl=@unspec, &(0x7f0000000300)=0x80) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@random={'trusted.', '/proc/self/net/pfkey\x00'}, &(0x7f00000000c0)=""/178, 0xb2) statfs(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)=""/147) 23:07:31 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) socket(0x1, 0x5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) [ 478.911264][T17857] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 478.975330][T17856] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:31 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="b332b0a1d1e4fa285131847cde2b643000"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:31 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) socket(0x1, 0x5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) 23:07:32 executing program 0: socket$kcm(0x11, 0x200000000000002, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)=r0, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:32 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000200)) setresuid(0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) 23:07:32 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x8, 0x80) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000180)={0xd}) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x20, 0x1) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x3000, &(0x7f0000000340)='/proc/self/net/pfkey\x00') mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='efivarfs\x00', 0x20, 0x0) 23:07:32 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000200)) setresuid(0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) 23:07:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e198b19b06cccc9ac5e3ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688a5622355131228c09debd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e"], 0x18}}], 0x40000000000037b, 0xc000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e953ac2d080872df2439c6d39f0825e35fea624c98a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f100000000000000"], 0x18}}], 0x40000000000037b, 0xc000) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r5, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf00a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a722d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b0affffffffffffffc2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}, 0x2000000}], 0x40000000000037b, 0xc000) 23:07:32 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/10], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:32 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000200)) setresuid(0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) 23:07:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e198b19b06cccc9ac5e3ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688a5622355131228c09debd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e"], 0x18}}], 0x40000000000037b, 0xc000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e953ac2d080872df2439c6d39f0825e35fea624c98a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f100000000000000"], 0x18}}], 0x40000000000037b, 0xc000) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r5, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf00a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a722d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b0affffffffffffffc2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}, 0x2000000}], 0x40000000000037b, 0xc000) 23:07:32 executing program 0: socket$kcm(0x11, 0x200000000000002, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)=r0, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:32 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) getsockname$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000000)=0x6e) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:32 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, 0x0) setresuid(0x0, r1, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) 23:07:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e198b19b06cccc9ac5e3ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688a5622355131228c09debd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e"], 0x18}}], 0x40000000000037b, 0xc000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e953ac2d080872df2439c6d39f0825e35fea624c98a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f100000000000000"], 0x18}}], 0x40000000000037b, 0xc000) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r5, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf00a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a722d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b0affffffffffffffc2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}, 0x2000000}], 0x40000000000037b, 0xc000) [ 480.350274][T17891] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 480.384643][T17893] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:33 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:33 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:33 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, 0x0) setresuid(0x0, r1, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) 23:07:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e198b19b06cccc9ac5e3ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688a5622355131228c09debd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e"], 0x18}}], 0x40000000000037b, 0xc000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e953ac2d080872df2439c6d39f0825e35fea624c98a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f100000000000000"], 0x18}}], 0x40000000000037b, 0xc000) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf00a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a722d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b0affffffffffffffc2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}, 0x2000000}], 0x40000000000037b, 0xc000) [ 480.657290][T17903] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:33 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, 0x0) setresuid(0x0, r1, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) 23:07:33 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xc) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e198b19b06cccc9ac5e3ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688a5622355131228c09debd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e"], 0x18}}], 0x40000000000037b, 0xc000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e953ac2d080872df2439c6d39f0825e35fea624c98a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f100000000000000"], 0x18}}], 0x40000000000037b, 0xc000) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf00a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a722d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b0affffffffffffffc2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}, 0x2000000}], 0x40000000000037b, 0xc000) [ 481.102380][T17911] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:33 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x5) setresuid(0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) 23:07:33 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="aa2a44224e998e38993a578c540109631c55480041f58346cdd1d46b6439bdabfbd694fd1c36f2394322a6c50a15c78774c6fe5c86044b26ac63b768e26ef963912c11e687f2f3777aa1c0450d7239100c8a39a16f5c551402054196e1aadb8772768931c3f8d9fa4b038a15d356186601a0603bf04940fd6ce082a3017a350a816c4bd2a566d022bd75fd9d37713875ddf4c178286e4bee5b8eb9c06566dd4327f941cd8444fd92385c0e369b5cc1e54127970575aac8583eebe813554f4f17fbc6b5678a97dbd5c52d8b8eebf4aaa6b261d087073aa73ecd146b1d17c256acd6863e780d0c828438b9597bbad7f09e747fe58024"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/seq\x00', 0x20000) modify_ldt$read(0x0, &(0x7f0000000180)=""/22, 0x16) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f00000001c0)={0x0, 'vcan0\x00', 0x3}, 0x18) 23:07:34 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:34 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x5) setresuid(0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) 23:07:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e198b19b06cccc9ac5e3ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688a5622355131228c09debd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e"], 0x18}}], 0x40000000000037b, 0xc000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e953ac2d080872df2439c6d39f0825e35fea624c98a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f100000000000000"], 0x18}}], 0x40000000000037b, 0xc000) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf00a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a722d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b0affffffffffffffc2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}, 0x2000000}], 0x40000000000037b, 0xc000) 23:07:34 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2f646487a73d05e430007a59fbe4d9372d5bc1eafda2d9b89c52545def0b60887bcd4f5b87e7aef4c8c17aa00311a84ee4fa86da1c60d0d7424502b02042bb8a7dc8d4dcd2233bac4ab973189e2885"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000000)=@req={0x4, 0x401, 0x2, 0xa6}, 0x10) 23:07:34 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x5) setresuid(0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x82040, 0x0) 23:07:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e198b19b06cccc9ac5e3ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688a5622355131228c09debd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e"], 0x18}}], 0x40000000000037b, 0xc000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e953ac2d080872df2439c6d39f0825e35fea624c98a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f100000000000000"], 0x18}}], 0x40000000000037b, 0xc000) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf00a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a722d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b0affffffffffffffc2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}, 0x2000000}], 0x40000000000037b, 0xc000) 23:07:34 executing program 5: mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:34 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) open(0x0, 0x82040, 0x0) 23:07:34 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:34 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) open(0x0, 0x82040, 0x0) 23:07:34 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e20, 0x4, @rand_addr="a015031e456b77341a23000c93106d80", 0xff}, {0xa, 0x4e21, 0x7675, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xf56}, 0x3, [0x7, 0x10001, 0x3ff, 0x101, 0x7d, 0x1f, 0x9, 0x80]}, 0x5c) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:34 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) ioctl$NBD_CLEAR_QUE(r0, 0xab05) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x10005, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0xfffffffffffffffb, 0x0, 0x10001, 0x1}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f0000000080)={0x3, r3}) 23:07:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e198b19b06cccc9ac5e3ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688a5622355131228c09debd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e"], 0x18}}], 0x40000000000037b, 0xc000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e953ac2d080872df2439c6d39f0825e35fea624c98a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f100000000000000"], 0x18}}], 0x40000000000037b, 0xc000) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf00a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a722d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b0affffffffffffffc2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}, 0x2000000}], 0x40000000000037b, 0xc000) 23:07:35 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) open(0x0, 0x82040, 0x0) [ 482.365531][T17950] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 482.401158][T17952] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 482.478419][T17958] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:35 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:35 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:35 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 23:07:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e198b19b06cccc9ac5e3ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688a5622355131228c09debd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e"], 0x18}}], 0x40000000000037b, 0xc000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e953ac2d080872df2439c6d39f0825e35fea624c98a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f100000000000000"], 0x18}}], 0x40000000000037b, 0xc000) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf00a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a722d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b0affffffffffffffc2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}, 0x2000000}], 0x40000000000037b, 0xc000) 23:07:35 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') 23:07:35 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 23:07:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e198b19b06cccc9ac5e3ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688a5622355131228c09debd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e"], 0x18}}], 0x40000000000037b, 0xc000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e953ac2d080872df2439c6d39f0825e35fea624c98a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f100000000000000"], 0x18}}], 0x40000000000037b, 0xc000) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r5, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf00a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a722d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b0affffffffffffffc2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}, 0x2000000}], 0x40000000000037b, 0xc000) 23:07:35 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f64ad6c787dbed96ffd"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) [ 483.169691][T17972] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:35 executing program 1: prctl$PR_SET_SECUREBITS(0x1c, 0xf) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r1, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 23:07:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e198b19b06cccc9ac5e3ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688a5622355131228c09debd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e"], 0x18}}], 0x40000000000037b, 0xc000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e953ac2d080872df2439c6d39f0825e35fea624c98a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f100000000000000"], 0x18}}], 0x40000000000037b, 0xc000) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r5, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf00a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a722d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b0affffffffffffffc2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}, 0x2000000}], 0x40000000000037b, 0xc000) 23:07:36 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e198b19b06cccc9ac5e3ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688a5622355131228c09debd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e"], 0x18}}], 0x40000000000037b, 0xc000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e953ac2d080872df2439c6d39f0825e35fea624c98a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f100000000000000"], 0x18}}], 0x40000000000037b, 0xc000) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r5, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf00a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a722d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b0affffffffffffffc2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}, 0x2000000}], 0x40000000000037b, 0xc000) 23:07:36 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) chdir(&(0x7f0000000140)='./file0\x00') getpeername(r0, &(0x7f0000000080)=@pptp, &(0x7f0000000100)=0x80) openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x8000, 0x10001) 23:07:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e198b19b06cccc9ac5e3ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688a5622355131228c09debd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e"], 0x18}}], 0x40000000000037b, 0xc000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e953ac2d080872df2439c6d39f0825e35fea624c98a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f100000000000000"], 0x18}}], 0x40000000000037b, 0xc000) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r5, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf00a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a722d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b0affffffffffffffc2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}, 0x2000000}], 0x40000000000037b, 0xc000) 23:07:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e198b19b06cccc9ac5e3ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688a5622355131228c09debd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e"], 0x18}}], 0x40000000000037b, 0xc000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e953ac2d080872df2439c6d39f0825e35fea624c98a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f100000000000000"], 0x18}}], 0x40000000000037b, 0xc000) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r5, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf00a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a722d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b0affffffffffffffc2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}, 0x2000000}], 0x40000000000037b, 0xc000) [ 483.872046][T17992] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:37 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e198b19b06cccc9ac5e3ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688a5622355131228c09debd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e"], 0x18}}], 0x40000000000037b, 0xc000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e953ac2d080872df2439c6d39f0825e35fea624c98a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f100000000000000"], 0x18}}], 0x40000000000037b, 0xc000) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf00a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a722d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b0affffffffffffffc2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}, 0x2000000}], 0x40000000000037b, 0xc000) 23:07:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e198b19b06cccc9ac5e3ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688a5622355131228c09debd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e"], 0x18}}], 0x40000000000037b, 0xc000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e953ac2d080872df2439c6d39f0825e35fea624c98a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f100000000000000"], 0x18}}], 0x40000000000037b, 0xc000) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf00a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a722d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b0affffffffffffffc2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}, 0x2000000}], 0x40000000000037b, 0xc000) 23:07:37 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r0, 0x40084146, &(0x7f00000000c0)) 23:07:37 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) r0 = semget(0x3, 0x1, 0x200) r1 = semget(0x3, 0x1, 0x200) unlink(&(0x7f0000000180)='./file0\x00') semctl$SEM_INFO(r1, 0x0, 0x13, 0x0) semctl$SEM_INFO(r1, 0x3, 0x13, 0x0) semctl$GETPID(r0, 0x1, 0xb, &(0x7f0000000080)=""/214) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2f0100d5a84cfd826576"], &(0x7f0000000280)='./file0\x00', &(0x7f0000000000)='squashfs\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) 23:07:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e198b19b06cccc9ac5e3ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688a5622355131228c09debd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e"], 0x18}}], 0x40000000000037b, 0xc000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e953ac2d080872df2439c6d39f0825e35fea624c98a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f100000000000000"], 0x18}}], 0x40000000000037b, 0xc000) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf00a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a722d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b0affffffffffffffc2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}, 0x2000000}], 0x40000000000037b, 0xc000) 23:07:38 executing program 5: clone(0x210612c17c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) tkill(r0, 0x38) ptrace(0x4206, r0) wait4(0x0, 0x0, 0x0, 0x0) 23:07:38 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:38 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}], 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 23:07:38 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') openat$vimc2(0xffffffffffffff9c, 0x0, 0x2, 0x0) clone(0x60080400, &(0x7f0000000080)="375d2edc81407c540f30f57f4f104f5c8de99ceb7bec6bd165d83431f68d838923f0bf73f07ddc9ec96d6e8d26d282cef7d69d5c67e9fc5945e03cd49a4abfd522dc3f234b44eed4b7c1901a51588bd42134b2ce21b7a66db1b1dc86fa686931d826a5d75778e8de6a5b4641444bffea7b8b3df7392bc1c8addfadbc3c2f7e535684ba7b8916c82968820da2739ec166d5591ba5a5b1", &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180)="867c5e3e310a56b067ac7bcf6380d4622d4870afd75ff09db71cd62f5d39f822bcacad26390589363cc24e798563f43e9c801f881535fa1c74a9cfa960c04b3fd7eb443966e731240b690e7513d904d1c41c75ce38c72469fdc07cbae9e67cd509aae20fb71d18ad79aef75a5e4eaa729e484a1e16f63b013618d8f3b3910799b5ea308e90aaa871b81e0ebb74") 23:07:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e198b19b06cccc9ac5e3ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688a5622355131228c09debd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e"], 0x18}}], 0x40000000000037b, 0xc000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e953ac2d080872df2439c6d39f0825e35fea624c98a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f100000000000000"], 0x18}}], 0x40000000000037b, 0xc000) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14}, &(0x7f0000000040)) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf00a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a722d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b0affffffffffffffc2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}, 0x2000000}], 0x40000000000037b, 0xc000) 23:07:38 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) writev(r2, &(0x7f0000000700)=[{&(0x7f0000000380)="f5dcbc060cb35273518116b1e17695572c912ab77d1d2469409f8bd770f4219a1902d2150b7a165e915148e045588796e5a6071e4d3e0cc13f468509d66b985515b300044f5d78d9546fcf9c6db2cff9586c8cb45333a18e15bd8a6c132289c1fe60a9a43afefe1b1fa6011d2a8afbe329d3b0cdebda1422555e8b448c3b6c66557df603f1622f20672368177817a67bbd061d933110e802ff4de4de834bfb4c098c63d13f35fc9e4b2acbba13d399443e4dcdd66fbc6061d9ab587204e44ede31fe08bb83ffdf6975d538c6af1398bece3a9b7dc9f4", 0xd6}, {&(0x7f0000000480)="6abbfa2efdfa853c6dd8c75de75d0cadf23c55ea22ce04d3f0b26704a655a21c699c15b2db49df74be804d270014442e295371548a2bcff11f9b2913eb816c682704aa06b35eeed7f87f5c3933aea7761a5fccb70d7b9fc7b8607ae7269103830a04f296197fb28722c4e781c08d6f444d92e58d9522f6b9efcc0b52f02cb4a3d15a011b394b33894fe5256fdd8448d20258ade9022628d8beb7c4cd8a5f1b14e5f06a5b9c1ac9cd6e7fae2b21b4e7f9716cddee109d31e1de9be8a06c897e4ce745d15a452e7732a8ec7564fe10677cb01bed1ce66aceaeb1009b", 0xdb}, {&(0x7f0000000580)="0fb3a2ea7b1b7745304260d7e422de3d64d9356c116180e94017e08db141bdaa669dbc4627c37aa7e941e411d9731372fadbf2615f28844dd3ab5c041f4c04c8baa5a74fae4ad8dd48fd0a28dfac62d9031088d1fc06c4c23adab3d0ae09fc9b341fbe80fa93df35c045028fad196fbacf5f682bf5417fe3689421a71f274efea935d2fc6f82645c0d1847dbd3760f851c3059a8e4095e58b958f7efafa537beb613d9779c38a56b18d275f5d9bea5647d35b9833b77b19078c5b30762439446c4e75dd9c9a20b9d3f2bab", 0xcb}, {&(0x7f0000000180)="e4e9f06d5cc636c3e333ff70d48dcded37e2f42e7f7a43498665b2e4e2e3eb451946deed1b83b283293f87e3be5d3fa9058c2524071d2f10a5a7692e5855", 0x3e}, {&(0x7f00000001c0)="ebebb6b4c01405165a6e04f32dc3be360093c3647af94ccee73ebe0ee37e1371de128a06d4bf3e69f564f05e7843e95c167247c0d1e4ab", 0x37}, {&(0x7f0000000680)="600e2e445549a213e571626282e41c1c96cae0979c0dc3b2af69fad6e154a3f439e36e54aee966110a58842f0d2b9e04fbe18059a20f1396391a6359f33b051fd56de90507855bac9b7228e691516830fecaafe07acbb1", 0x57}], 0x6) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r3, 0x10, 0x70bd26, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 485.808936][T18031] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:38 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) r1 = gettid() sched_rr_get_interval(r1, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x6) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x2, 0x0) setreuid(0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x290408, &(0x7f0000000400)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=9p2000.u'}, {@nodevmap='nodevmap'}, {@cachetag={'cachetag', 0x3d, '/dev/audio\x00'}}, {@dfltgid={'dfltgid'}}], [{@appraise='appraise'}, {@fsmagic={'fsmagic', 0x3d, 0x6}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'trusted]'}}, {@fowner_lt={'fowner<'}}, {@dont_hash='dont_hash'}, {@euid_gt={'euid>'}}]}}) ioctl$TIOCSTI(r3, 0x5412, 0x3fe00) write$evdev(r2, &(0x7f0000000180)=[{{0x0, 0x7530}, 0x0, 0x2}], 0x11e8) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) socket$tipc(0x1e, 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nvram\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x7040, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00') [ 485.989774][T18026] isofs_fill_super: root inode is not a directory. Corrupted media? [ 486.024395][T18035] IPVS: ftp: loaded support on port[0] = 21 23:07:38 executing program 1: 23:07:38 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 486.217897][T18047] Unknown ioctl 21522 [ 486.338387][T18031] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 486.380311][T18047] Unknown ioctl 21522 23:07:39 executing program 3: 23:07:39 executing program 1: 23:07:39 executing program 5: [ 486.545153][ T161] tipc: TX() has been purged, node left! 23:07:39 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e198b19b06cccc9ac5e3ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688a5622355131228c09debd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e"], 0x18}}], 0x40000000000037b, 0xc000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e953ac2d080872df2439c6d39f0825e35fea624c98a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f100000000000000"], 0x18}}], 0x40000000000037b, 0xc000) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14}, &(0x7f0000000040)) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf00a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a722d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b0affffffffffffffc2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}, 0x2000000}], 0x40000000000037b, 0xc000) 23:07:39 executing program 3: 23:07:39 executing program 1: 23:07:39 executing program 5: 23:07:39 executing program 3: 23:07:39 executing program 1: 23:07:39 executing program 5: 23:07:39 executing program 3: 23:07:39 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:39 executing program 1: 23:07:39 executing program 5: 23:07:39 executing program 3: 23:07:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e198b19b06cccc9ac5e3ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688a5622355131228c09debd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e"], 0x18}}], 0x40000000000037b, 0xc000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e953ac2d080872df2439c6d39f0825e35fea624c98a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f100000000000000"], 0x18}}], 0x40000000000037b, 0xc000) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14}, &(0x7f0000000040)) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf00a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a722d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b0affffffffffffffc2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}, 0x2000000}], 0x40000000000037b, 0xc000) 23:07:40 executing program 5: 23:07:40 executing program 1: 23:07:40 executing program 3: 23:07:40 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2f6465362f6e62643000c44011cda53a6489efd69f687044104096f13bbddf462990d61daa64f88c25bbe9d0e86cfb714f5c4f4396bb2235bc0f8d7ba62641c06408d96c7c1fa2b1ed36dc71ceeaaf471c9febcf5dc8d7c9e4cc1c2d4d5e287db4073136ce8027e61c23c5f853ffd1a61f1cb120e028dd83a259e4731efa042f426809eaffc81d59f684eb9cef2af9cfd72e056de1280ddcd4dc41f9c4922263aeedca15f27f0860a96613215955b6cfec7edac8145e7c6eaf"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x2, &(0x7f0000000340)='/proc/self/net/pfkey\x00') ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) r2 = syz_genetlink_get_family_id$netlbl_unlabel(0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000040)=ANY=[@ANYBLOB="c800", @ANYRES16=r2, @ANYBLOB="00022abd7000fedbdf25040000002b00070073797374656d5f753a6f626a6563745f723a7373685f6b657967656e5f657865635f743a733000003300070073797374656d5f753a6f626a6563745f723a756e636f6e66698a65645f657865636d656d5f657865635f743a73300000080005007f00000114000200ff010000000000000000000000000001080005000000"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICLIST(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000400)={0x78, r2, 0x400, 0x70bd29, 0x25df5bfe, {}, [@NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:klogd_var_run_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @ipv4={[], [], @multicast1}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @local}]}, 0x78}, 0x1, 0x0, 0x0, 0x24000000}, 0x40000) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x10005, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r3, 0x10f, 0x84, &(0x7f0000000180), &(0x7f0000000240)=0x4) 23:07:40 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:40 executing program 5: 23:07:40 executing program 3: 23:07:40 executing program 1: 23:07:40 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) 23:07:40 executing program 5: 23:07:40 executing program 3: [ 488.194977][T18121] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 488.223383][T18121] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e198b19b06cccc9ac5e3ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688a5622355131228c09debd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e"], 0x18}}], 0x40000000000037b, 0xc000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e953ac2d080872df2439c6d39f0825e35fea624c98a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f100000000000000"], 0x18}}], 0x40000000000037b, 0xc000) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf00a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a722d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b0affffffffffffffc2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}, 0x2000000}], 0x40000000000037b, 0xc000) 23:07:41 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:41 executing program 1: 23:07:41 executing program 5: 23:07:41 executing program 3: 23:07:41 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r0, 0xc01064c7, &(0x7f0000000080)={0x2, 0x0, &(0x7f0000000000)=[0x0, 0x0]}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r2, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x14, r5, 0xb03, 0x0, 0x0, {0x10}}, 0x14}}, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r3, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20800}, 0xc, &(0x7f0000000200)={&(0x7f0000000480)={0x1a4, r5, 0x400, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1f}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x80000000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xe36}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xc4}]}, @TIPC_NLA_MEDIA={0x50, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5c}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5d5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}]}]}, @TIPC_NLA_SOCK={0x70, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1ff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x926}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x800}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xfffffffa}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8bf}]}, @TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}]}, @TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}]}, @TIPC_NLA_SOCK={0x5c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x1f}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8ac8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x101}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3d}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffffff5b}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xb1}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x9f}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xffffffc7}]}, @TIPC_NLA_BEARER={0x4}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x8040}, 0x4000090) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x1000000c8) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000380)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r7}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r7, 0x10, 0x0, @in={0x2, 0x4e21, @remote}}}, 0x90) 23:07:41 executing program 1: 23:07:41 executing program 3: 23:07:41 executing program 5: [ 488.843492][T18137] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:41 executing program 3: 23:07:41 executing program 1: 23:07:41 executing program 3: 23:07:42 executing program 5: 23:07:42 executing program 3: 23:07:42 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:42 executing program 1: 23:07:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e198b19b06cccc9ac5e3ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688a5622355131228c09debd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e"], 0x18}}], 0x40000000000037b, 0xc000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e953ac2d080872df2439c6d39f0825e35fea624c98a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f100000000000000"], 0x18}}], 0x40000000000037b, 0xc000) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf00a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a722d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b0affffffffffffffc2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}, 0x2000000}], 0x40000000000037b, 0xc000) 23:07:42 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYRESOCT, @ANYRES16=r0, @ANYBLOB="b0b24a996018fb3e0e81d9df79e2d03dbd399a887f9e0b12a77adcb5418130487930442e20c2", @ANYRESOCT=r0, @ANYBLOB="d0891914d695be4810b954a42f676e474ab4ec005745be65679552"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x20d4013, &(0x7f0000000340)='/proc/self/net/pfkey\x00') ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) 23:07:42 executing program 3: 23:07:42 executing program 5: 23:07:42 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307a60a05057b513c27050076003639080000000000000000043c2dbd3a795b65fccfffb644d89c2d275747f139439082c46419d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b", 0x9f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 23:07:42 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) syz_mount_image$afs(&(0x7f0000000080)='afs\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x4, 0x4, &(0x7f0000000600)=[{&(0x7f0000000100)="13e4bf902d75e452be5bbae919457f29c2a8b3179233f06ffcfb7c0ce226c0e9279e2e0b57ff6f9e5138cb1dacd57d1132a993d84cebe7cff687d6097e21e6214e24df31e633a50b2f258113099f48f44f395a23ed7a36c4f0c3ee2066c6a5376d6a45bdf0d15ae55ad663fb111e54e57dd71fbce9a47bbba6e62a348b505604b707c7bdbd93f247be42bab984f5a53ed0bd1a10f69afc0dfbaf2d83736c3a0b2f75e9fda958e78a6d28ce0ce4c4b6514ed7885da9250473c580b2d83cfed61b799dc6e0a6c22609fbf1a3ed7007e979b1b8f2b0b2875284b23891fec30992eb1e218ece7b894821c3ee394b8badbb73f33926", 0xf3, 0x9}, {&(0x7f0000000380)="505be5e5356903dd7c83357e0ffdb87d95839ca1c8e57d60b57ccb525d6e182160994561dddb74686f3b7e9c1b614218a986c9a5c477fae424ba88e1aa9a6103eecd770caf808b9329460dd69d407b10eb6dfdcd8e8401996ffeda97cdad2988c0dcb5", 0x63, 0xfcf1}, {&(0x7f0000000400)="714de4273974166050fc78a4ef9176980ce6b8a83555b7cb4bcec369d25e177dbb59e4b075ed25f9e988f22f99da47f40f4edd9240a1127871b7d9c874a88ff90f49b3dfbb2fa66b05ea7c0022b5e2683844ba3c36db4c9c0621eac348593c7c0b4f69aeba3a226af700ed5b761f4872e24590086c2f43d95555dc12af690ec16cc88ccad57513d55d9f670a99ab0f93d14f695ab8c3bcc20f634f1f53c803dc34eabf2eb2377913f614c15b6a98c36c6a3182f9b8590099ff81f236fb1451dda02be030e400740161b21c85f7764b266b5379", 0xd3, 0x6}, {&(0x7f0000000500)="8706365237ad29f0232c2ee67f077604289eab282aec9106b9bad495c1a168c0299c74beea8c09e371d92235d65a00f7af117532a896ceee5ac64dfa5e3efe7f07cfa45e30c7d0d703647eb367ea74dea70f54b92d0e04916362d25b0e741ec9bad8633ee5761a9162e631889562b1cbdbc742aa6c7fbdfd6a19a5616713d64aa76dd17c9b3c3f9c40cc5b8bc0ca7425ded368c415e2633684f4ff103fd971bebdaaee686606b49cff14fe116e14966f65d3adab760971994c00360f80434a469c116280367dbb9f5c4e1e6f140a9a98c0f944583cc85ce6c2fb2c8952f3b0bcf4671d90a2bf5d0e1ff301a1d2b152f232a4be4d980316", 0xf7, 0x2}], 0x2000002, &(0x7f0000000200)={[{@dyn='dyn'}, {@dyn='dyn'}, {@flock_openafs='flock=openafs'}], [{@fsname={'fsname', 0x3d, '['}}]}) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x6, 0x2bc, 0x6, 0x2, 0x2, 0x9}) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) 23:07:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0xf, 0x41}, 0x18) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:42 executing program 1: symlink(&(0x7f0000000080)='./file2\x00', &(0x7f00000000c0)='./file0\x00') rename(&(0x7f0000000500)='./file0\x00', &(0x7f0000000000)='./file2\x00') statx(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x100, 0x0, &(0x7f0000000540)) 23:07:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000440)={'dummy0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@setlink={0x34, 0x13, 0x32b, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_VFINFO_LIST={0xc, 0x16, 0x0, 0x1, [{0x8, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x4}]}]}, @IFLA_CARRIER={0x5}]}, 0x34}}, 0x0) [ 489.937022][T18173] ptrace attach of "/root/syz-executor.1"[18172] was attempted by "/root/syz-executor.1"[18173] [ 489.974130][T18174] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:42 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 490.103898][T18188] A link change request failed with some changes committed already. Interface dummy0 may have been left with an inconsistent configuration, please check. [ 490.171511][T18198] A link change request failed with some changes committed already. Interface dummy0 may have been left with an inconsistent configuration, please check. 23:07:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0xf, 0x41}, 0x18) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f0000000080)=ANY=[]) 23:07:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e198b19b06cccc9ac5e3ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688a5622355131228c09debd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e"], 0x18}}], 0x40000000000037b, 0xc000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e953ac2d080872df2439c6d39f0825e35fea624c98a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f100000000000000"], 0x18}}], 0x40000000000037b, 0xc000) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf00a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a722d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b0affffffffffffffc2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}, 0x2000000}], 0x40000000000037b, 0xc000) 23:07:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x46, &(0x7f0000000500)=ANY=[@ANYBLOB="ddcac3b2339fb89fffffff0086dd60bf6e0000103a00fe8000000000000000000700000000bbff0200000000000000000000000000010200907800"/70], 0x0) 23:07:43 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x1) syz_emit_ethernet(0x4e, &(0x7f0000000580)={@random="63e8d985f6da", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x0], @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "481f00", 0x18, 0x3a, 0x0, @remote, @mcast2, {[@fragment], @ni}}}}}, 0x0) 23:07:43 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0xf, 0x41}, 0x18) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 490.690328][T18224] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING 23:07:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x4}, 0x68) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f0000000080)='ocfs2\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) 23:07:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mremap(&(0x7f0000115000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f000048c000/0x1000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) [ 490.951656][T18236] (syz-executor.4,18236,1):ocfs2_parse_options:1449 ERROR: Unrecognized mount option "/proc/self/net/pfkey" or missing value 23:07:43 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0xf, 0x41}, 0x18) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:43 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:43 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)="665307a60a05057b513c27050076003639080000000000000000043c2dbd3a795b65fccfffb644d89c2d275747f139439082c46419d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab9", 0xc1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 23:07:43 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x1) [ 491.041625][T18236] (syz-executor.4,18236,1):ocfs2_fill_super:1175 ERROR: status = -22 [ 491.080457][T18236] (syz-executor.4,18236,1):ocfs2_parse_options:1449 ERROR: Unrecognized mount option "/proc/self/net/pfkey" or missing value [ 491.112998][T18236] (syz-executor.4,18236,1):ocfs2_fill_super:1175 ERROR: status = -22 23:07:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) socket$packet(0x11, 0x3, 0x300) connect$inet6(r2, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r2, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) [ 491.162244][T18250] ptrace attach of "/root/syz-executor.1"[18247] was attempted by "/root/syz-executor.1"[18250] [ 491.193936][T18253] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING [ 491.337453][T18258] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 491.373238][T18253] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING 23:07:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e198b19b06cccc9ac5e3ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688a5622355131228c09debd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e"], 0x18}}], 0x40000000000037b, 0xc000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e953ac2d080872df2439c6d39f0825e35fea624c98a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f100000000000000"], 0x18}}], 0x40000000000037b, 0xc000) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r5, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf00a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a722d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b0affffffffffffffc2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}, 0x2000000}], 0x40000000000037b, 0xc000) 23:07:44 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') set_robust_list(&(0x7f0000000180)={&(0x7f00000000c0)={&(0x7f0000000080)}, 0x0, &(0x7f0000000140)={&(0x7f0000000100)}}, 0x18) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) 23:07:44 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:44 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) close(r2) [ 491.645671][T18267] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 491.693401][T18267] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:44 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:44 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000080)={0x10001, 0x7, 0x4, 0x1, 0x8, {}, {0x5, 0x0, 0x27, 0x20, 0x3f, 0x1f, "81eb6752"}, 0xcb280000, 0x4, @offset=0x1, 0x17, 0x0, 0xffffffffffffffff}) write$FUSE_LSEEK(r2, &(0x7f0000000000)={0x18, 0x0, 0x1, {0x3}}, 0x18) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="2f6465762f6e001b0559b460cc2a9e2e15454ffac91326deeef9b6392eab3fb4e1203411610e6c50cfbc27c3eb084d976e"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) 23:07:44 executing program 1: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="bab36ffdd953dd774229c6a0e0d23e83d6f028c572d0cbb5a00b0a3c89efab2f70f7926febd73f24941279437020014c051fafa915155845e012e9a146eeae8bad2a62a7be1721032a0a0d2436852e3f2460d296a6fa0fa2f40fee57aa665a0aa6704edee0185599a7a728854f3aac89e8c69724d7d9b5a6a946d263af2c47fa7a3e66113c9ef10b96a615a9ee702d93737669041fda0117d904eb02e8c968be86712b62295ec0a6f5454c3fec200f6106d0e597877c09fe7c3bcfa04e0759b3579538063f907ad8598c9db5226952a318b32fa87219962a427ce29e604c4c96c1b0ebc2b933606310c9d516952ac2b77ef16758cc7ec57ed1b511b4ff844f0aa21fce80b8f81cbf570757a5334ba14b5bb361a38a39fcc6143495ea9f99a7f8dfda8816a4eb8b669511ea04", @ANYPTR, @ANYPTR64], 0x0, 0x13c}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/2, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:07:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000040)=0xffffffffffffffff) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0xac14141b}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 23:07:44 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000b80)="4c52112ebf727016be8754c85a71f41ab9e50bea68fc9d092cdc659357aa366c4870ca9d1072763a7d0347196a383dcc391fbe128337cc929b71aaae219bf6ea230fa064d1b78309f087d2ce681c53c3ed3b2bb968dae8d5448254538da84f0e49e6dbfb64652e543b94fa4b811ae8b95048651d0cb55084c5b70fd001197d2ca9ce721dfc3cc4231ec3f806db846de71f10f80565c741cf4101a15da695acec94dc0be4f14de2384d23f16220988b8a128b45f93d4dc0db97247a35d7175af8642215f5e9c60b9de05ec21e710f2e21", 0xd0}], 0x1}, 0x40011) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 491.967897][T18288] ptrace attach of "/root/syz-executor.1"[18286] was attempted by "/root/syz-executor.1"[18288] 23:07:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2800000010005fba0000000000854481ab000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000004014db3da38dfb9822f51f7789d960bf549e5c4222de6357"], 0x28}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 23:07:44 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x100, 0x1) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) [ 492.009341][T18289] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 492.141705][T18295] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 492.155929][T18297] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 492.170254][T18295] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 492.191115][T18297] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 492.201790][T18295] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 492.234983][ C1] [ 492.237355][ C1] ======================================================== [ 492.244539][ C1] WARNING: possible irq lock inversion dependency detected [ 492.251728][ C1] 5.6.0-syzkaller #0 Not tainted [ 492.256658][ C1] -------------------------------------------------------- [ 492.263846][ C1] ksoftirqd/1/16 just changed the state of lock: [ 492.270159][ C1] ffffffff898090d8 (tasklist_lock){.+.?}-{2:2}, at: send_sigurg+0x9f/0x320 [ 492.275650][T18298] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 492.278753][ C1] but this lock took another, SOFTIRQ-unsafe lock in the past: [ 492.278756][ C1] (&pid->wait_pidfd){+.+.}-{2:2} [ 492.278766][ C1] [ 492.278766][ C1] [ 492.278766][ C1] and interrupts could create inverse lock ordering between them. [ 492.278766][ C1] [ 492.278769][ C1] [ 492.278769][ C1] other info that might help us debug this: [ 492.278773][ C1] Possible interrupt unsafe locking scenario: [ 492.278773][ C1] [ 492.278775][ C1] CPU0 CPU1 [ 492.278777][ C1] ---- ---- [ 492.278779][ C1] lock(&pid->wait_pidfd); [ 492.278785][ C1] local_irq_disable(); [ 492.278787][ C1] lock(tasklist_lock); [ 492.292834][T18298] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 492.293516][ C1] lock(&pid->wait_pidfd); [ 492.300072][T18298] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 492.312857][ C1] [ 492.312860][ C1] lock(tasklist_lock); [ 492.312868][ C1] [ 492.312868][ C1] *** DEADLOCK *** [ 492.312868][ C1] [ 492.312875][ C1] 4 locks held by ksoftirqd/1/16: [ 492.312877][ C1] #0: ffffffff899bb200 (rcu_read_lock){....}-{1:2}, at: process_backlog+0x1ad/0x7a0 [ 492.312995][ C1] #1: ffffffff899bb200 (rcu_read_lock){....}-{1:2}, at: ip_local_deliver_finish+0x124/0x360 [ 492.313046][ C1] #2: ffff88808e17e260 (slock-AF_INET/1){+.-.}-{2:2}, at: tcp_v4_rcv+0x2d09/0x39c0 [ 492.313074][ C1] #3: ffff8880923fb3b8 (&f->f_owner.lock){.+.?}-{2:2}, at: send_sigurg+0x1a/0x320 [ 492.313095][ C1] [ 492.313095][ C1] the shortest dependencies between 2nd lock and 1st lock: [ 492.313112][ C1] -> (&pid->wait_pidfd){+.+.}-{2:2} { [ 492.313122][ C1] HARDIRQ-ON-W at: [ 492.313135][ C1] lock_acquire+0x1f2/0x8f0 [ 492.313148][ C1] _raw_spin_lock+0x2a/0x40 [ 492.313191][ C1] proc_pid_make_inode+0x1f9/0x3c0 [ 492.313202][ C1] proc_pid_instantiate+0x51/0x150 [ 492.313212][ C1] proc_pid_lookup+0x1da/0x340 [ 492.313221][ C1] proc_root_lookup+0x20/0x60 [ 492.313231][ C1] __lookup_slow+0x256/0x490 [ 492.313239][ C1] walk_component+0x418/0x6a0 [ 492.313249][ C1] link_path_walk.part.0+0x4f1/0xb50 [ 492.313259][ C1] path_openat+0x25a/0x27b0 [ 492.313269][ C1] do_filp_open+0x203/0x260 [ 492.313305][ C1] do_sys_openat2+0x585/0x770 [ 492.313320][ C1] do_sys_open+0xc3/0x140 [ 492.542830][ C1] do_syscall_64+0xf6/0x7d0 [ 492.549156][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 492.556954][ C1] SOFTIRQ-ON-W at: [ 492.561027][ C1] lock_acquire+0x1f2/0x8f0 [ 492.567355][ C1] _raw_spin_lock+0x2a/0x40 [ 492.573677][ C1] proc_pid_make_inode+0x1f9/0x3c0 [ 492.580718][ C1] proc_pid_instantiate+0x51/0x150 [ 492.587692][ C1] proc_pid_lookup+0x1da/0x340 [ 492.594281][ C1] proc_root_lookup+0x20/0x60 [ 492.600871][ C1] __lookup_slow+0x256/0x490 [ 492.607281][ C1] walk_component+0x418/0x6a0 [ 492.613782][ C1] link_path_walk.part.0+0x4f1/0xb50 [ 492.621015][ C1] path_openat+0x25a/0x27b0 [ 492.627578][ C1] do_filp_open+0x203/0x260 [ 492.633904][ C1] do_sys_openat2+0x585/0x770 [ 492.640399][ C1] do_sys_open+0xc3/0x140 [ 492.646563][ C1] do_syscall_64+0xf6/0x7d0 [ 492.652905][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 492.660618][ C1] INITIAL USE at: [ 492.664605][ C1] lock_acquire+0x1f2/0x8f0 [ 492.670843][ C1] _raw_spin_lock_irqsave+0x8c/0xbf [ 492.677825][ C1] __wake_up_common_lock+0xb4/0x130 [ 492.684760][ C1] do_notify_parent+0x19e/0xe60 [ 492.691327][ C1] do_exit+0x238f/0x2dd0 [ 492.697432][ C1] call_usermodehelper_exec_async+0x507/0x710 [ 492.705390][ C1] ret_from_fork+0x24/0x30 [ 492.711515][ C1] } [ 492.714110][ C1] ... key at: [] __key.53746+0x0/0x40 [ 492.721622][ C1] ... acquired at: [ 492.725496][ C1] _raw_spin_lock_irqsave+0x8c/0xbf [ 492.730845][ C1] __wake_up_common_lock+0xb4/0x130 [ 492.736299][ C1] do_notify_parent+0x19e/0xe60 [ 492.741295][ C1] do_exit+0x238f/0x2dd0 [ 492.745695][ C1] call_usermodehelper_exec_async+0x507/0x710 [ 492.751913][ C1] ret_from_fork+0x24/0x30 [ 492.756485][ C1] [ 492.758790][ C1] -> (tasklist_lock){.+.?}-{2:2} { [ 492.763881][ C1] HARDIRQ-ON-R at: [ 492.767841][ C1] lock_acquire+0x1f2/0x8f0 [ 492.773989][ C1] _raw_read_lock+0x2d/0x40 [ 492.780130][ C1] do_wait+0x3b9/0xa00 [ 492.785828][ C1] kernel_wait4+0x14c/0x260 [ 492.791969][ C1] call_usermodehelper_exec_work+0x172/0x260 [ 492.799574][ C1] process_one_work+0x965/0x16a0 [ 492.806139][ C1] worker_thread+0x96/0xe20 [ 492.812330][ C1] kthread+0x388/0x470 [ 492.818028][ C1] ret_from_fork+0x24/0x30 [ 492.824066][ C1] IN-SOFTIRQ-R at: [ 492.828027][ C1] lock_acquire+0x1f2/0x8f0 [ 492.834244][ C1] _raw_read_lock+0x2d/0x40 [ 492.840396][ C1] send_sigurg+0x9f/0x320 [ 492.846449][ C1] sk_send_sigurg+0x76/0x300 [ 492.852690][ C1] tcp_urg+0x38c/0xb80 [ 492.858397][ C1] tcp_rcv_established+0x8f3/0x1d90 [ 492.865242][ C1] tcp_v4_do_rcv+0x605/0x8b0 [ 492.871462][ C1] tcp_v4_rcv+0x2f60/0x39c0 [ 492.877593][ C1] ip_protocol_deliver_rcu+0x57/0x880 [ 492.884591][ C1] ip_local_deliver_finish+0x220/0x360 [ 492.891672][ C1] ip_local_deliver+0x1c8/0x4e0 [ 492.898145][ C1] ip_rcv_finish+0x1da/0x2f0 [ 492.904356][ C1] ip_rcv+0xd0/0x3c0 [ 492.909878][ C1] __netif_receive_skb_one_core+0xf5/0x160 [ 492.917321][ C1] __netif_receive_skb+0x27/0x1c0 [ 492.923981][ C1] process_backlog+0x21e/0x7a0 [ 492.930599][ C1] net_rx_action+0x4c2/0x1070 [ 492.936917][ C1] __do_softirq+0x26c/0x9f7 [ 492.943068][ C1] run_ksoftirqd+0x89/0x100 [ 492.949205][ C1] smpboot_thread_fn+0x653/0x9e0 [ 492.955860][ C1] kthread+0x388/0x470 [ 492.961562][ C1] ret_from_fork+0x24/0x30 [ 492.967601][ C1] SOFTIRQ-ON-R at: [ 492.971564][ C1] lock_acquire+0x1f2/0x8f0 [ 492.977710][ C1] _raw_read_lock+0x2d/0x40 [ 492.983854][ C1] do_wait+0x3b9/0xa00 [ 492.989548][ C1] kernel_wait4+0x14c/0x260 [ 492.995675][ C1] call_usermodehelper_exec_work+0x172/0x260 [ 493.003278][ C1] process_one_work+0x965/0x16a0 [ 493.009844][ C1] worker_thread+0x96/0xe20 [ 493.015971][ C1] kthread+0x388/0x470 [ 493.021665][ C1] ret_from_fork+0x24/0x30 [ 493.027699][ C1] INITIAL USE at: [ 493.031571][ C1] lock_acquire+0x1f2/0x8f0 [ 493.037610][ C1] _raw_write_lock_irq+0x5b/0x80 [ 493.044097][ C1] copy_process+0x3430/0x72c0 [ 493.050322][ C1] _do_fork+0x12d/0x1010 [ 493.056123][ C1] kernel_thread+0xb1/0xf0 [ 493.062092][ C1] rest_init+0x23/0x365 [ 493.067866][ C1] start_kernel+0x867/0x8a1 [ 493.073914][ C1] secondary_startup_64+0xa4/0xb0 [ 493.080507][ C1] } [ 493.083104][ C1] ... key at: [] tasklist_lock+0x18/0x40 [ 493.090799][ C1] ... acquired at: [ 493.094601][ C1] mark_lock+0x624/0xf10 [ 493.099062][ C1] __lock_acquire+0x1ed9/0x4e00 [ 493.104074][ C1] lock_acquire+0x1f2/0x8f0 [ 493.108735][ C1] _raw_read_lock+0x2d/0x40 [ 493.113394][ C1] send_sigurg+0x9f/0x320 [ 493.117886][ C1] sk_send_sigurg+0x76/0x300 [ 493.122629][ C1] tcp_urg+0x38c/0xb80 [ 493.126848][ C1] tcp_rcv_established+0x8f3/0x1d90 [ 493.132196][ C1] tcp_v4_do_rcv+0x605/0x8b0 [ 493.136938][ C1] tcp_v4_rcv+0x2f60/0x39c0 [ 493.141592][ C1] ip_protocol_deliver_rcu+0x57/0x880 [ 493.147112][ C1] ip_local_deliver_finish+0x220/0x360 [ 493.152718][ C1] ip_local_deliver+0x1c8/0x4e0 [ 493.157718][ C1] ip_rcv_finish+0x1da/0x2f0 [ 493.162456][ C1] ip_rcv+0xd0/0x3c0 [ 493.166523][ C1] __netif_receive_skb_one_core+0xf5/0x160 [ 493.172517][ C1] __netif_receive_skb+0x27/0x1c0 [ 493.177692][ C1] process_backlog+0x21e/0x7a0 [ 493.182740][ C1] net_rx_action+0x4c2/0x1070 [ 493.187576][ C1] __do_softirq+0x26c/0x9f7 [ 493.192232][ C1] run_ksoftirqd+0x89/0x100 [ 493.196903][ C1] smpboot_thread_fn+0x653/0x9e0 [ 493.201998][ C1] kthread+0x388/0x470 [ 493.206220][ C1] ret_from_fork+0x24/0x30 [ 493.210784][ C1] [ 493.213089][ C1] [ 493.213089][ C1] stack backtrace: [ 493.218978][ C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.6.0-syzkaller #0 [ 493.226754][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 493.236785][ C1] Call Trace: [ 493.240085][ C1] dump_stack+0x188/0x20d [ 493.244412][ C1] check_usage_forwards.cold+0x20/0x29 [ 493.249868][ C1] ? check_usage_backwards+0x4e0/0x4e0 [ 493.255304][ C1] ? stack_trace_save+0x8c/0xc0 [ 493.260132][ C1] ? stack_trace_consume_entry+0x160/0x160 [ 493.265912][ C1] ? print_usage_bug+0x240/0x240 [ 493.270830][ C1] ? __bfs+0x185/0x520 [ 493.274877][ C1] ? save_trace+0x42/0x9f0 [ 493.279273][ C1] mark_lock+0x624/0xf10 [ 493.283491][ C1] ? check_usage_backwards+0x4e0/0x4e0 [ 493.288927][ C1] ? print_usage_bug+0x240/0x240 [ 493.293961][ C1] __lock_acquire+0x1ed9/0x4e00 [ 493.298936][ C1] ? mark_held_locks+0xe0/0xe0 [ 493.303746][ C1] ? bictcp_cong_avoid+0x142/0xe80 [ 493.308877][ C1] ? tcp_rate_gen+0x456/0x6a0 [ 493.313531][ C1] ? tcp_newly_delivered+0x116/0x160 [ 493.318805][ C1] ? tcp_update_pacing_rate+0x1cf/0x2d0 [ 493.324333][ C1] lock_acquire+0x1f2/0x8f0 [ 493.328813][ C1] ? send_sigurg+0x9f/0x320 [ 493.333294][ C1] ? lock_release+0x800/0x800 [ 493.337963][ C1] _raw_read_lock+0x2d/0x40 [ 493.342445][ C1] ? send_sigurg+0x9f/0x320 [ 493.346927][ C1] send_sigurg+0x9f/0x320 [ 493.351237][ C1] sk_send_sigurg+0x76/0x300 [ 493.355802][ C1] tcp_urg+0x38c/0xb80 [ 493.359850][ C1] ? __tcp_ack_snd_check+0x950/0x950 [ 493.365108][ C1] ? tcp_validate_incoming+0x42b/0x1670 [ 493.370633][ C1] tcp_rcv_established+0x8f3/0x1d90 [ 493.375808][ C1] ? lock_release+0x800/0x800 [ 493.380459][ C1] ? tcp_data_queue+0x4430/0x4430 [ 493.385512][ C1] ? do_raw_spin_lock+0x129/0x2e0 [ 493.390521][ C1] tcp_v4_do_rcv+0x605/0x8b0 [ 493.395094][ C1] tcp_v4_rcv+0x2f60/0x39c0 [ 493.399579][ C1] ? tcp_v4_early_demux+0x8d0/0x8d0 [ 493.404770][ C1] ? rcu_read_lock_held+0x9c/0xb0 [ 493.409789][ C1] ? rcu_read_lock_held_common+0x130/0x130 [ 493.415590][ C1] ip_protocol_deliver_rcu+0x57/0x880 [ 493.420949][ C1] ip_local_deliver_finish+0x220/0x360 [ 493.426650][ C1] ip_local_deliver+0x1c8/0x4e0 [ 493.431478][ C1] ? ip_local_deliver_finish+0x360/0x360 [ 493.437105][ C1] ? ip_rcv+0x24e/0x3c0 [ 493.441237][ C1] ? ip_protocol_deliver_rcu+0x880/0x880 [ 493.446882][ C1] ? lock_downgrade+0x840/0x840 [ 493.451717][ C1] ? ip_rcv_finish_core.isra.0+0x606/0x1ec0 [ 493.457585][ C1] ip_rcv_finish+0x1da/0x2f0 [ 493.462153][ C1] ip_rcv+0xd0/0x3c0 [ 493.466114][ C1] ? ip_local_deliver+0x4e0/0x4e0 [ 493.471131][ C1] ? ip_rcv_finish_core.isra.0+0x1ec0/0x1ec0 [ 493.477086][ C1] ? lock_acquire+0x1f2/0x8f0 [ 493.481738][ C1] ? process_backlog+0x1ad/0x7a0 [ 493.486653][ C1] ? ip_local_deliver+0x4e0/0x4e0 [ 493.491651][ C1] __netif_receive_skb_one_core+0xf5/0x160 [ 493.497438][ C1] ? __netif_receive_skb_core+0x30e0/0x30e0 [ 493.503309][ C1] ? rwlock_bug.part.0+0x90/0x90 [ 493.508225][ C1] __netif_receive_skb+0x27/0x1c0 [ 493.513240][ C1] process_backlog+0x21e/0x7a0 [ 493.517980][ C1] ? perf_sched_cb_inc+0x250/0x250 [ 493.523063][ C1] ? net_rx_action+0x25f/0x1070 [ 493.527893][ C1] net_rx_action+0x4c2/0x1070 [ 493.532548][ C1] ? napi_busy_loop+0x950/0x950 [ 493.537395][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 493.543359][ C1] __do_softirq+0x26c/0x9f7 [ 493.547864][ C1] ? takeover_tasklets+0x810/0x810 [ 493.552992][ C1] run_ksoftirqd+0x89/0x100 [ 493.557484][ C1] smpboot_thread_fn+0x653/0x9e0 [ 493.562405][ C1] ? __smpboot_create_thread.part.0+0x340/0x340 [ 493.568636][ C1] ? __kthread_parkme+0x13f/0x1e0 [ 493.573660][ C1] ? __smpboot_create_thread.part.0+0x340/0x340 [ 493.579884][ C1] kthread+0x388/0x470 [ 493.584042][ C1] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 493.589757][ C1] ret_from_fork+0x24/0x30 23:07:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e198b19b06cccc9ac5e3ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688a5622355131228c09debd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e"], 0x18}}], 0x40000000000037b, 0xc000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e953ac2d080872df2439c6d39f0825e35fea624c98a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f100000000000000"], 0x18}}], 0x40000000000037b, 0xc000) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r5, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf00a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a722d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b0affffffffffffffc2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}, 0x2000000}], 0x40000000000037b, 0xc000) 23:07:47 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:47 executing program 4: mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000380)={@val, @void, @mpls={[{0x6}, {}, {0x7}, {0x7fff, 0x0, 0x1}], @ipv6=@dccp_packet={0x2, 0x6, "5d5297", 0x17e, 0x21, 0xc3, @mcast1, @rand_addr="83652e53ce12b3fbaae8036a0efe1176", {[@dstopts={0xc, 0x0, [], [@jumbo={0xc2, 0x4, 0x200}]}, @dstopts={0x2e, 0x6, [], [@calipso={0x7, 0x30, {0x1, 0xa, 0x1f, 0x7fff, [0x0, 0x3, 0x7, 0x2, 0x40]}}]}, @srh={0x3b, 0x2, 0x4, 0x1, 0x1f, 0x78, 0x8001, [@local]}, @hopopts={0x87, 0x1, [], [@calipso={0x7, 0x8, {0x1, 0x0, 0x81, 0xfff7}}, @enc_lim={0x4, 0x1, 0x1}]}, @dstopts={0x87, 0x8, [], [@ra={0x5, 0x2, 0x8}, @enc_lim={0x4, 0x1, 0x80}, @hao={0xc9, 0x10, @loopback}, @padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x10, {0x0, 0x2, 0x0, 0x9, [0x7f]}}, @hao={0xc9, 0x10, @mcast1}]}, @hopopts={0x0, 0x5, [], [@hao={0xc9, 0x10, @loopback}, @pad1, @pad1, @jumbo={0xc2, 0x4, 0xa563}, @pad1, @pad1, @jumbo={0xc2, 0x4, 0x4}]}], {{0x4e21, 0x4e22, 0x4, 0x1, 0x0, 0x0, 0x0, 0x9, 0x5, "7d91b9", 0x3f, "00baf0"}, "466692e408d1ba593a39fd7f7e32778ceb2825445d7897552779a50d20918ce4ee0a2cc9c356303a9290aa18a4ba228a037b68be46f52ed8eb718bf4652fabad5f8731e614bb3bbfbe415e9909ad04044858b072cea69035cfacc5cee3e6947cbefc394b4a05"}}}}}, 0x1ba) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) getpeername$unix(r0, &(0x7f0000000080)=@abs, &(0x7f0000000000)=0x6e) 23:07:47 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x1) syz_emit_ethernet(0x62, &(0x7f0000000780)={@link_local, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x0], @void, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, "ec7f2b", 0x2c, 0x6, 0x0, @empty, @dev, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:07:47 executing program 1: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="bab36ffdd953dd774229c6a0e0d23e83d6f028c572d0cbb5a00b0a3c89efab2f70f7926febd73f24941279437020014c051fafa915155845e012e9a146eeae8bad2a62a7be1721032a0a0d2436852e3f2460d296a6fa0fa2f40fee57aa665a0aa6704edee0185599a7a728854f3aac89e8c69724d7d9b5a6a946d263af2c47fa7a3e66113c9ef10b96a615a9ee702d93737669041fda0117d904eb02e8c968be86712b62295ec0a6f5454c3fec200f6106d0e597877c09fe7c3bcfa04e0759b3579538063f907ad8598c9db5226952a318b32fa87219962a427ce29e604c4c96c1b0ebc2b933606310c9d516952ac2b77ef16758cc7ec57ed1b511b4ff844f0aa21fce80b8f81c", @ANYPTR, @ANYPTR64], 0x0, 0x117}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/2, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:07:47 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40011) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:47 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000000)={0x419}, 0x7) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 494.640566][T18329] ptrace attach of "/root/syz-executor.1"[18327] was attempted by "/root/syz-executor.1"[18329] [ 494.652676][T18326] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING 23:07:47 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0xf, 0x41}, 0x18) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:47 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x1) syz_emit_ethernet(0x62, &(0x7f0000000780)={@link_local, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x0], @void, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, "ec7f2b", 0x2c, 0x6, 0x0, @empty, @dev, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:07:47 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x1) syz_emit_ethernet(0x62, &(0x7f0000000780)={@link_local, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x0], @void, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, "ec7f2b", 0x2c, 0x6, 0x0, @empty, @dev, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) [ 494.849509][T18345] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING 23:07:47 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0xf, 0x41}, 0x18) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:47 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x1) syz_emit_ethernet(0x62, &(0x7f0000000780)={@link_local, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x0], @void, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, "ec7f2b", 0x2c, 0x6, 0x0, @empty, @dev, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) [ 494.918511][T18349] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING [ 495.029944][T18361] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING 23:07:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e198b19b06cccc9ac5e3ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688a5622355131228c09debd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e"], 0x18}}], 0x40000000000037b, 0xc000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e953ac2d080872df2439c6d39f0825e35fea624c98a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f100000000000000"], 0x18}}], 0x40000000000037b, 0xc000) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r5, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf00a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a722d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b0affffffffffffffc2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}, 0x2000000}], 0x40000000000037b, 0xc000) 23:07:50 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:50 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0xf, 0x41}, 0x18) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:50 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x1) syz_emit_ethernet(0x62, &(0x7f0000000780)={@link_local, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x0], @void, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, "ec7f2b", 0x2c, 0x6, 0x0, @empty, @dev, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:07:50 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x1) syz_emit_ethernet(0x62, &(0x7f0000000780)={@link_local, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x0], @void, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, "ec7f2b", 0x2c, 0x6, 0x0, @empty, @dev, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:07:50 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="096400762f6e626430be"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') [ 497.671027][T18382] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING [ 497.703666][T18384] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING 23:07:50 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000240)=@sr0='/dev/sr0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x88080, &(0x7f0000000340)='/procx[\x8b\xbef/net/pfkey\x00') ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$tun(r0, &(0x7f0000000280)={@val, @void, @eth={@multicast, @broadcast, @val={@void}, {@x25}}}, 0x19) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x1000000c8) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000000)) 23:07:50 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0xf, 0x41}, 0x18) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:50 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c1030000030000002004000000000000800200000000000000000000800000005003000050030000500300005003000050030400030000000000000000000000fe8000000000000000000000000000bbff020000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000076657468315f746f5f626f6e640000006e657470636930000000000000000000000000000000000000000000000000000000000000000000001d000000000000000000000000000000000000500280020000000001000000000000000000000000000000000000005001686173686c696d69740000000000000000000000000000000000000000027465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000fe18b61a000800000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a6b616c6c657231000000000000000000000000000004000000000000000000000005000000a60000000000000000000000000000003000434f4e4e4d41524b00000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800434c4153534946590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000068c80000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) syz_emit_ethernet(0x62, &(0x7f0000000780)={@link_local, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x0], @void, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, "ec7f2b", 0x2c, 0x6, 0x0, @empty, @dev, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:07:50 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c9ecee866f55e3376e4a82071d7827afd2d144b81e55b3f31672797fc00300533324f871d94768e25851d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223989bb454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98d7df3768db9bd084623ca56c82b205eca4d90628aeacbd4654eb4371861a98bb8fc0fb89f8abf8e94d4429449cd85af76d9929b318c989bead2f9921120246508b0ab814b38f9cac8fea1a8c4712b53306cdca649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf57cc5c62f45fcaccb1a340192b163740fe1d88025abb82bd69fee234d7ec248140975fe9e8b211157f53a0dabb1f2fae8ad00d7483087d47c9319b27c755d9487d68141e3f137d3c725590311a9e633b559564c4a71674bbc5d86ad0e0ad69fd66380aee6b043911bd1da3ca2cb319295e5473cb8d4a6ce1bfcdfcd3d2eee36ca224b088388e29d9486499ac7f997a42aa3d67a0a84b1aef6af1c615e948480469607755b0e4a897085b69feede236a6845b10af6a9cb71128b99ce62ff4abaf559713cde9bb662aa9469bc8f9d0786e09f22fee09caa955aaa1985fac8d2287cef63aa069caf951449a6488c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:50 executing program 3: socket$inet6(0xa, 0x80003, 0x6b) syz_emit_ethernet(0x62, &(0x7f0000000780)={@link_local, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x0], @void, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, "ec7f2b", 0x2c, 0x6, 0x0, @empty, @dev, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) [ 497.889248][T18401] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING 23:07:50 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0xf, 0x41}, 0x18) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 499.874897][ T0] NOHZ: local_softirq_pending 08 [ 499.880197][ T0] NOHZ: local_softirq_pending 08 23:07:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e198b19b06cccc9ac5e3ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688a5622355131228c09debd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e"], 0x18}}], 0x40000000000037b, 0xc000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e953ac2d080872df2439c6d39f0825e35fea624c98a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f100000000000000"], 0x18}}], 0x40000000000037b, 0xc000) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r5, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf00a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a722d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b0affffffffffffffc2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1000000"], 0x18}, 0x2000000}], 0x40000000000037b, 0xc000) 23:07:53 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x1) 23:07:53 executing program 3: syz_emit_ethernet(0x62, &(0x7f0000000780)={@link_local, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0x0], @void, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, "ec7f2b", 0x2c, 0x6, 0x0, @empty, @dev, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 23:07:53 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0xf, 0x41}, 0x18) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:53 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:07:53 executing program 4: mount(&(0x7f0000000180)=ANY=[@ANYBLOB="2f645f762f6e626430002d1d0f58539a6812b5803b79bb73811decd06e145daeeb5227b24dfb27cdc4c053f8b381e553d32e9ec8c237baa16343d137e7aca0512a067f94597e6099adc843348426eecc574f5fafb6f646ff0bf8db14afb16a603d39481704a30618379b7709e3e17d0c061ebfe2aa222a77a0ad61cf6d20af2ad4c1ce7c796b66eec04ccbd530176f21aaf6b66d6814f41e761c477b4dbfd0b325857152c99b26aff6961c4d51470fd3af2c14b734fc7fc805f8f3c620e8c0a72054d254f95671abde9d60d6de2d1a13eb8a98f888df1367623a913420f1"], &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000340)='/proc/self/net/pfkey\x00') ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) 23:07:53 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000140)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='udf\x00', 0x0, &(0x7f0000000080)='/proc/self/net/pfkey\x00k#\xefb\xe7\xc8\x8c\xdab\xd8\xca\x13\xe8u\xce3\xc0\x16:\xd2\xb6\xde\x8d\x98+E\x80\xb9\x7fN\xe1:\xb1\xb0\xee\v\xcb\x92c\xef\x1e\xf7\xd9\xb9\xfa\xffl\xb1\xc8\xfam\xd2\x91\x88\x8b:A\x83\xd9\xb7$\xb6\xaa\x19\xcf\x95\xd7\x1b\n\x1d\x11J}\x9fW\xc9@\xb4\x11\x87=y\x83u]a,\vvvg\xe92\x8an-%\x90Mg\xbb\x9b\\\xfd\xf5\xcc\xaf\xac\x99\xfd\xa9q6\x9eN/\xd3\xe2\xe1\x15=\x18\x94\x1c\xf5\x83(Rg\x06z\x1f@g\xc2`u\x92\xfb') ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, 0x0) [ 500.782476][T18436] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING 23:07:53 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) 23:07:53 executing program 1: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x1) 23:07:53 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0xf, 0x41}, 0x18) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:53 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000001780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b700030000009e40f086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 500.916667][T18450] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value [ 500.950969][T18450] UDF-fs: bad mount option "/proc/self/net/pfkey" or missing value 23:07:53 executing program 1: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x1)