2fa909145943a7a570568127382f99974a5efa666eba2204f2a0496949fd1a33b09ee8ed8cf8eb9097df34db9d2b6512dfb721e48cf9363906fc1feab410e57e12ce7e0700901d6afd4a2d8bad3a156796c28eb808b8e2b914beb2dcaa0b1ece41e7368dfca05f915967b27d9a0bdb628d22d83bbd9cdd344f9595ef8f3302bb1337e789f9d7e8149ea4ace88162a43d3c4edeaca85ca0a5973abc0f2e55f4498a65e9ac01ca6cf32d2d66effeee68a6ad3e68e047a7c987e7f6af50725ded2c0701af65994884d00bf53129003ab2c464748537504d6e87d700fc761aa7c1c38188b1e3a595e07f1f26ae73b612be77a291cc984beccf0a8d068ed13c5fc1161fffe6871cdb81ab99f781abe6e6d76bb8db4f7c76ee1f7c0602fd5fcf515997ee1899c2c89c0790fcda7aad321048b18bd7fd3f663de04deb22c6ec6eede17892a02f61dff95e35bc9159ff8b32f01400f6359a2eb18f91e3508ecb4ca15a2bef0c71e38bdfc8feb1fdd6dc62b7a1645e5630c0b40fe3d54d7dc0d99337910c0b43b2a2d8802de03c4317bc285428e9b803cc12032d52cd111acd7f249040e6498244f9e136b999664175de214a7a5725c087c54c092310f8ef86a5c8c3445ff72458326eef6787ed8f07711213bd951cc00028d94eeeb57555a7bcca134cace339cbcb4b33c4611bd485483f159dd025243fb5b9ee97fc9fec4130c16211063dad99c4344df7ff7af63c8e5df306b24b5522cd1a130ebbe1d055ae563c4a0ebebf9272cf6e8460340691fe439e66c68c72d9d125213a20b45c2676a4af836e15c5f250ff85cc003653e5665aa1611483f68245163d03fc905a203e6ad89a2fcd1a1a9eedd6570fe86477c6fad648a47ad972e09dbdd4bb9efb5720d97ceb51f34733bdb9af907bb482595df5084a60c33d383f9c0ec924ec5c3ddbdd0dd23ba8361acca2209840073e966ab939f7e7b8c84a5db2c3ffde58291e1fe94018cc3e6c5e84659baa8c78bb6d20a1a425c182cf6015df4c23b72d737e86b414ded0dd045a0a00b1637d6a123e291f6e5088ebb1d66417ebe96babc7d3b3ae336f28461ed0317016d1c529f6cc402f3a08ce34a68de16c0dd5dfe62a46aedc4b1f1dc3facacc159ee30ab122f965d918f0be8333e6f2c03de65b71308cbc960551f84f3e667f671590595752dfec99631735ffd26e4e3dce804916b53511c62bc781147a8daf2097e89de422060725323442fb1c86817cfd526d12e5c44718446e36bd149c3b8c955ec18619a89941222e7739e086a9fba9fd7bae7b6eb84be670ed00e29f1838fa4485c6364bc90ecd21d331edc0397e31b27b9095f9d31c0355d6e43aabc62d7bb2a1cc2f0580d78aa477126f2d12844960e80a3984f05832b03105456248a5fd3c6ffa353f96eadd0e96e499166d37537e7488379152b96054aa1b30bbb7aad1755fad21a6050e189a94e8cdd41c4aa327dab4b09c95036399fff29cd8fcd0d385c36eed9b58c299e03bedd423941af454585058dfb37915c5e3e84f0f223684aef22ff678cbc233e5871c8ef4105e0f1220359893914eba6954d39996929c25be0b3f43338314ccee02e6474797b22f53da6e49c06c336f40f2f28d9f55eff15d8673a4d407d58f0aeab986e5c16cc6b6032dbc904d38c480443d3c31762fb7ba23cf83e1c969bd0b04d39327b5553cf6e4dfe674a69198ecfeed4c7cbe1fd531aae0185cf4a964b7c0a0571b39740237519d235fdefdc2ec97be462ce6b214c5257a539789f8a2a3736e4d750e476f2218bc38110ca4cd18b6ccff65c88dcfa385b31e925a8cb1480d62558e6e8b9aafcd78cb418f4516d4d8f1475239a7e52f908611e14e4939251cbf62b2a849048ab346dd745f7da17acd3037ee24557e61ce7a9e81ff21d9aeb195beb3271e1fe04aca03ba26ff315c2b95ecb064273fd44c1701d8b2cb4778adfb518b02a06205a42585f21fce33dab20da1035d36a52a04fd57af9985341dc436d9805f83d65cceb700517a1d27775a2920064ce6fd100d65fda929b05ffa70169b7a7f44bff0d0d8f4a5a7f5213e1f7f6132484d3dcaeb06e5fd99d", 0x1000}, 0x1006) pselect6(0x40, &(0x7f0000000000)={0x8}, &(0x7f0000000040), &(0x7f0000000300), &(0x7f0000000340)={0x0, 0x1c9c380}, &(0x7f00000003c0)={&(0x7f0000000380), 0x8}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r3, &(0x7f0000000080)="dd876225527bcd", &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r3, &(0x7f0000000080)}, 0x10) 18:41:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:13 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:13 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000040)="50ff59ddc6cfeb1f1145c32c1b794b"}, 0x10) 18:41:14 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) sched_setaffinity(0x0, 0x8, &(0x7f0000000080)=0x9) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000002c0)=0x61) read(0xffffffffffffffff, &(0x7f00000000c0)=""/11, 0xb) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2}) 18:41:14 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000040)=0x10480, 0x4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) 18:41:14 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080)}, 0x10) 18:41:14 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) sched_setaffinity(0x0, 0x8, &(0x7f0000000080)=0x9) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000002c0)=0x61) read(r0, &(0x7f00000000c0)=""/11, 0xb) r1 = syz_open_pts(0xffffffffffffffff, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2}) 18:41:14 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000040)={'filter\x00'}, &(0x7f0000000100)=0x44) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) 18:41:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x10002, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 18:41:14 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:14 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x10002, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 18:41:14 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000040)=0x10480, 0x4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) 18:41:14 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:14 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) r1 = syz_open_dev$usb(&(0x7f000000b480)='/dev/bus/usb/00#/00#\x00', 0x20, 0x800c2) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f000000b500)='IPVS\x00') r3 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14, 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000400)={&(0x7f0000000300)={0xd0, r3, 0x8, 0x70bd29, 0x25dfdbfd, {}, [{{0x8, 0x1, r4}, {0xb4, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}]}}]}, 0xd0}, 0x1, 0x0, 0x0, 0x4000}, 0x4) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f000000b640)={&(0x7f000000b4c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f000000b600)={&(0x7f000000b540)={0xbc, r2, 0x120, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xad2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gre0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x81}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3239cf82}, @IPVS_DEST_ATTR_INACT_CONNS={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x40}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffffffffff8}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x4000005}, 0x4000000) 18:41:15 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffff9c, 0xfffffffffffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, &(0x7f00000004c0)={0x2, 0x2, {0x2, 0x0, 0x8, 0x800000003, 0x2cc5}}) socketpair$unix(0x1, 0x80004000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f00000003c0)=0x111) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0)=0x100000001, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001f9) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r5, &(0x7f0000000080)="dd876225527bcd", &(0x7f0000000180)}, 0x20) r6 = syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r6, 0x40605346, &(0x7f0000000440)={0x39b, 0x3, {0xffffffffffffffff, 0x2, 0x8, 0x0, 0x7fff}}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r5, &(0x7f0000000080)}, 0x10) 18:41:15 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x400, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000380), &(0x7f00000003c0)=0x4) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000340)={0x9, 0x40, 0x82, &(0x7f0000000280)="6ec8caccfacfb08803cd195b3eb67e88f57d2ba1873c75ee2a17323de4ab1343de266fdcffa57bac03ff8c82707ba9cc5b5b0295812578ffa1414fb1a6ed3766305ef2a78b789027c4b8942b55c6b8bfcda65c32cf6f94a3ae32b4c55120f748e9178eb4b79d2879c92a00f1b36b3da8a9f998b751e6a4f3390d2417e9bcd2bc3693"}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/fib_triestat\x00') setsockopt$inet6_int(r2, 0x29, 0x13, &(0x7f0000000080)=0x20, 0x4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r0, &(0x7f0000000000)="c6fb4a3830e8399221ecfd643f6174e9c6c5be580cf62d6983cf633a52c86c8ab2fbdda13c8798570af80383cc38327c8601dc1e285d3237a805df074c9242d3"}, 0xfffffffffffffc32) mq_timedsend(r2, &(0x7f0000000140)="f12f0691e2845c79b8001eaae1bc2947d90f93359af4783ad506eb7a89a6f143d0c0a9a0078466965f17e88446ba15aac34f9654b5bf0c090eb62e8be0b50c543fdbe85cc11ca772b69bbce2189663c79c5a6898861ce0e6bdd27f6dc29da3badd3edde9be3e7da0f9d88897ff5796e54f2e48a1352f699b80ff3b581db7cdd83834f66b4244a8bf332f7c137f91bb9d1d329fcf2e99ee2a898bfb757833ee56d37342c0e1ec9fb21db4363e3e4536e2", 0xb0, 0x9, &(0x7f0000000200)) 18:41:15 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000280)={0x4e5967d2, 0x4, 0x6, 0x2}, &(0x7f00000002c0)=0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080)="dd876225527bcd", &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:15 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2000, 0x0) sendto$inet6(r0, &(0x7f0000000100)="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", 0x1000, 0x800, &(0x7f0000000040)={0xa, 0x4e21, 0x100000001, @mcast1, 0x1}, 0x1c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r1, &(0x7f0000001380)}, 0x10) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x4200, 0x0) 18:41:15 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r3 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x8, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r3, 0x80045300, &(0x7f00000001c0)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r2, &(0x7f0000000080)="dd876225527bcd", &(0x7f0000000180)}, 0x20) r4 = fcntl$getown(r0, 0x9) ptrace$poke(0x5, r4, &(0x7f0000000040), 0x7) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r2, &(0x7f0000000080)}, 0x10) 18:41:15 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) sched_setaffinity(0x0, 0x8, &(0x7f0000000080)=0x9) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000002c0)=0x61) read(r0, &(0x7f00000000c0)=""/11, 0xb) syz_open_pts(r0, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2}) 18:41:15 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f0000000080)}, 0x10) 18:41:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x10002, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) 18:41:15 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x8, 0x400000) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r1, &(0x7f0000001380)}, 0x30) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x99, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x2, 0x400, 0x6, 0x35, r1}, 0x2c) ioctl$TIOCCONS(r2, 0x541d) 18:41:15 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:15 executing program 2 (fault-call:2 fault-nth:0): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:15 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) [ 465.961001] FAULT_INJECTION: forcing a failure. [ 465.961001] name failslab, interval 1, probability 0, space 0, times 0 [ 465.972482] CPU: 1 PID: 20902 Comm: syz-executor2 Not tainted 4.19.0-rc1+ #42 [ 465.979816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 465.989333] Call Trace: [ 465.992005] dump_stack+0x14b/0x190 [ 465.995726] should_fail+0xa98/0xaa0 [ 465.999537] __should_failslab+0x278/0x2a0 [ 466.003899] should_failslab+0x29/0x70 [ 466.007878] __kmalloc_track_caller+0x1f4/0xc60 [ 466.012630] ? __do_sys_bpf+0x4f1c/0xe860 [ 466.016893] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 466.022377] ? __fget_light+0x6a3/0x700 [ 466.026468] memdup_user+0x7c/0x1e0 [ 466.030158] __do_sys_bpf+0x4f1c/0xe860 [ 466.034249] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 466.039808] ? prepare_exit_to_usermode+0x13f/0x410 [ 466.044946] ? syscall_return_slowpath+0xdb/0x700 [ 466.049909] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 466.055383] ? fput+0x257/0x2e0 [ 466.058784] __se_sys_bpf+0x8e/0xa0 [ 466.062503] __x64_sys_bpf+0x4a/0x70 [ 466.066282] do_syscall_64+0xb8/0x100 [ 466.070154] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 466.075445] RIP: 0033:0x457099 [ 466.078721] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 466.097690] RSP: 002b:00007f08b706dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 18:41:16 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x10002, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 18:41:16 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f0000000080)}, 0x10) 18:41:16 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x400000) fcntl$getownex(r0, 0x10, &(0x7f00000002c0)={0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000340)=0xc) r4 = getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)=0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r1, &(0x7f0000000a80)=[{&(0x7f0000000140)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000280)=[{&(0x7f00000001c0)="6f9dfc63cbacaa18f5f9fa70eccfafd95e3430057a980f1e24b3892ceab1ab4443ce0704626515f89157cbfe4fa4116e40c366bc03045cd52d45a9", 0x3b}, {&(0x7f0000000200)="a3666f1b225284a2221ad7da80e232ad49a43b3aa545b051bb1e44ad739addf0bde9e13c3c95dc0e302707d2c2b717eb9b255263162b6267c55a0d6703a2835c4bbd27b85cf2d0fff30189fc2a84a7", 0x4f}], 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="20050000000000000100000002000000", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="2000000000000000010000eb02000080ac9d91504fb1fc08000700000000000000000000f2ffffff002eaa3f483245f6cc4a64d5540029ff1b684d77b70db4fd005124d59745453e76b2e4b87a34fa3dcd2d9a8003ea3e2497d9842c12cd0abb857aee821f5b1696e3353789442d", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0], 0xa0, 0x20000080}, {&(0x7f00000005c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000a00)=[{&(0x7f0000000640)="6e7d7b41cf74dd2049a89e23c3bf4b23cbf7ef3d3fd2ebbdeb97e3ca621356fea11cb294b53dccc067cdbc9f6e1a89837806bbdcf309450ac7fc1ece8b36116d88d423f1e1a441a7f0a7c009749488c8c759886b25bcb7959cb62fd186a7ea27aae3b4d74b36e65ab423591704520ed92d1997ad678c9feebbe12aef9a37022deb30ae861d2abd78423e7b092b4cd09422f4082c3d51d32ea58670b1ddcc3779a548fb45314963503e7714e2d2e1ef7163af05feca01483f44", 0xb9}, {&(0x7f0000000700)="38563d9cdf2d673c32ebcdd4a89578a6ea78554be8637308625ba2a2e2ac29cbc78d252ef71963318bfe7a9f01bc11016a746c9dfe6902262329c55412deb68791ea", 0x42}, {&(0x7f0000000780)="516ce7b39cd9e782cf9e3c94ab5a2b00d1b301095f5f08cbf726a9c811a824ae939a5001ea748a9c2ec5154fd26f215e964db4979ca84851a1bdc0402a280ace148a23b2cc77cf41736e6e22cb6b812144d07387835282182c0108359339f60437f785cff16861ad91b02a42727699000918e4ddc5cef578d9d7e344ef03ba1e71e79fb2caf1b5e74d39f5ede9db149b2cf41442212e194d6f832447559c74fa91102b7ec2f4f5497d61f1941079811de183a08be29a1e6f8325877cafd1ad5b45eb4294a60f78664b97eafa4f41d9c231917d679453932fb6fd7b496dd4a109101bd0fb325a96a46ca954", 0xeb}, {&(0x7f0000001340)="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", 0x1000}, {&(0x7f0000000880)="131c44dd489d8e6c5f950a5be119790437368d84e918b76358d8b8baf9fb6d8e1498b146ce956272a635803755bf8ca03dac7275b523d4f7e641184ce5daaa7d19340dc17204de4a4d8f21b13642e001bc5e1d6e791729307560bfdae2603794f297a0504e5af0d0e1304cb03f0da6273bee7e1827db1bb82c4ebbd5a7a3d5fd2ea5330463e0d47ca8ff9c10c3bb1599ab91794d3462eaa6e5958e8c34b96bf77bd14ef69dbcd33b88ae75eaaa5275c2775201847376465f2729", 0xba}, {&(0x7f0000000940)="c5a208b3ee6432ab67ef50a26862aaa89a3d3712d2478cd9d1bf9c0ff2861578af461075456a0b9b7abe972c251502f02638630ed6e06973953086e43e6694193456460f41dbe88fa4d4698529aa614c033abad3dd93f8623937755b82212df812a074273d981a94f11b28c50c1b77e2f31a00175cd22fbab6cfc600d728dbaaac2af00e1e3a3bb83b01f99b02fd6b8fc99a05", 0x93}], 0x6, 0x0, 0x0, 0x11}], 0x2, 0x20000084) [ 466.105494] RAX: ffffffffffffffda RBX: 00007f08b706e6d4 RCX: 0000000000457099 [ 466.112837] RDX: 0000000000000010 RSI: 0000000020000140 RDI: 0000000000000003 [ 466.120176] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 466.127516] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 466.134856] R13: 00000000004cb908 R14: 00000000004c32ca R15: 0000000000000000 18:41:16 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) r1 = dup2(r0, r0) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev={[], 0x13}, 'veth0\x00'}}) 18:41:16 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:16 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f0000000080)}, 0x10) 18:41:16 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) sched_setaffinity(0x0, 0x8, &(0x7f0000000080)=0x9) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000002c0)=0x61) read(r0, &(0x7f00000000c0)=""/11, 0xb) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, 0xffffffffffffffff, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2}) 18:41:16 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:16 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) r1 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x40, 0xdb9, 0x4, 0x800}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x10001, 0x3, 0x0, 0x12, r0, 0x9008126}, 0x2c) 18:41:16 executing program 2 (fault-call:2 fault-nth:1): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:16 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x10002, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) 18:41:16 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:16 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:16 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:16 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x9, 0x7, 0xff}, 0x2c) openat(r0, &(0x7f0000000040)='./file0\x00', 0x400, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) 18:41:17 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @multicast1}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000000000)=0xe8) ioprio_get$uid(0x3, r1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:17 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 18:41:17 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:17 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:17 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x800004, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000140)=0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) accept4(r1, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000000080)=0x80, 0x800) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r2, &(0x7f0000001380)}, 0x10) 18:41:17 executing program 2: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) ptrace$getenv(0x4201, r0, 0x64, &(0x7f0000000180)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f0000000380)="d0089f1ca5ebfe68db6e8c902e710dea9d292eb412e8d36b1b1ef27c18ae22e970529cc1fb60a730d6a1280f5b2217ecb3f974f1ecf9767d3a62fcea7812deb7b0afe050d46c351565452213983a367fdbc872c2e5ddc7f909b213952d8a186fa1a46fe0c7ccc6de9348e9f08ab61e8b1afccc630a613c2757b379b50cf23876f3c15a1c688cd4be0d1ce1cd16bde9a1e110"}, 0x10) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x12000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYBLOB="fc0000007d9c6d97820a5be87d09933619fc48001309142e9605b894125266a2444418f4add40fcfa4505aa8f1e2ee22bcc222c64a9de35a71d8f8c9b93aacb57ed6b7498c6efaf6395cff1850704054bcb86b9489cbebcf19e5b60b90999b6122fc864300006cfe62d38b9a4af373b47f08e0801d51b2acade297957a50341646a8e52c75f398b3dc19dce9dcc7793595c3db9e9986cd88dc4e0d6bdb34c7754dad8bb5b76fa653681ee50977bace4e4b8ca71d9d946c8b796f7d9947dad2bbe1d3e3c22bc972e58decdc052d89dfe24d1d675a332d9c2de16d03a2f856bdb3ae0b73e23cf7ca463abe5017e055cc73fd877f6fa2444fcd54ce502b90602717"], &(0x7f0000000040)=0x104) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000080)={r3, 0x0, 0x3}, 0x8) 18:41:17 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:17 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) sched_setaffinity(0x0, 0x8, &(0x7f0000000080)=0x9) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000002c0)=0x61) read(r0, &(0x7f00000000c0)=""/11, 0xb) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2}) 18:41:17 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:17 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x801, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000040)={0x7, [0x6, 0x80000000, 0x401, 0x8, 0x9, 0x6, 0x8]}, &(0x7f0000000080)=0x12) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000240)}, 0x10) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x40, r2, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@FOU_ATTR_AF={0x8}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) 18:41:17 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000080)='-}cgroupeth0\x00', 0x0) keyctl$assume_authority(0x10, r1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r2 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x5, 0x2000) r3 = getpid() ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000180)=r3) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x10002, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) 18:41:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:18 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:18 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:18 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80000, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000240)={0x78, 0x2, 0x8, 'queue0\x00', 0xfffffffffffffffb}) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:18 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x805, 0x3, 0x7, 0x4, 0x0, 0x1, 0xfffeffffffffffff}, 0xd4) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000140)={0xa, 0x4, 0xc6c}) ioctl$EXT4_IOC_SHUTDOWN(r0, 0x8004587d, &(0x7f0000000080)=0x2) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4000, &(0x7f00000002c0)=0x3, 0x0, 0x0) timer_create(0x1, &(0x7f0000000000)={0x0, 0x6, 0x5}, &(0x7f0000000040)=0x0) r3 = getegid() setfsgid(r3) timer_gettime(r2, &(0x7f00000001c0)) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="060000000000000001000000000000000200000000000000", @ANYRES32=r0, @ANYBLOB="0000e765000000000000060000000000000000bebe5cd5000000e400", @ANYRES32=r0, @ANYBLOB="00000000dd0e0000000000000020ea02000000000000000000000000057abca45e3c1f7e18e0c232cdf20f54"]) setsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000300)=0x400, 0x4) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000100)=0x980, 0x4) write$P9_RRENAMEAT(r1, &(0x7f0000000180)={0xfffffffffffffffd, 0x4b, 0x1}, 0x2) 18:41:18 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x10002, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 18:41:18 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:18 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x800, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) fstatfs(r0, &(0x7f0000000040)=""/82) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1}, 0x10) 18:41:18 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:18 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) sched_setaffinity(0x0, 0x8, &(0x7f0000000080)=0x9) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000002c0)=0x61) read(r0, &(0x7f00000000c0)=""/11, 0xb) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) 18:41:18 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xfffffffffffffff8, 0x40000000002203) socket$inet6(0xa, 0x3, 0x7fffffff) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e21, 0x9, @empty, 0x3f}}, 0x4, 0x2f17, 0x5, 0x2, 0x3b6925a2}, &(0x7f0000000040)=0x98) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) 18:41:18 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:18 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:18 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) sched_setaffinity(0x0, 0x8, &(0x7f0000000080)=0x9) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000002c0)=0x61) read(r0, &(0x7f00000000c0)=""/11, 0xb) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000140)) 18:41:18 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000000)={0x101, 0x7, 0x3, 0x0, 0x0, [{r0, 0x0, 0x401}, {r0, 0x0, 0x7}, {r0, 0x0, 0x10001}]}) 18:41:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x10002, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) 18:41:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x4000000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:19 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:19 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:19 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:19 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'\x00', {0x2, 0x4e22, @local}}) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl(r1, 0x8000, &(0x7f0000000180)="f7b42a1110de185ef14435445cebec4b99b2fefb55ce742d0bec545afe35dbe640d2ba6723f4ebd0befb8876a607d4dc9a60a8bd87567609805d3861f359818bd6bba537e0d23d1f074abe1a4a19990c29ca8ffe25a1") r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r2, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r2, &(0x7f0000000080)}, 0x10) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$int_out(r3, 0x5460, &(0x7f0000000040)) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, &(0x7f0000000040)) 18:41:19 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:19 executing program 4: mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x10002, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 18:41:19 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x360, 0x40) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000180)) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000200)) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000003540)={0x0, @local, @dev}, &(0x7f0000003580)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000035c0)={@local, 0x4f, r1}) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040)=@assoc_value={0x0}, &(0x7f0000000080)=0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x2c) r4 = getpgrp(0xffffffffffffffff) ptrace$setregs(0xffffffffffffffff, r4, 0x98, &(0x7f0000000100)="4377372cf6fe753fe09d7bf58051401dbf88e777644a75dd82") ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x3) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000000)=0x7, 0x8) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r3}, 0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000140)={r2, 0x0, 0x80000000, 0xffffffffffffffff, 0x8, 0x20}, 0x14) 18:41:19 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r1 = memfd_create(&(0x7f0000000000)=',\x00', 0x1) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000040)=0xfffffffffffffc00, 0x8) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:19 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:19 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0xfffffffffffffffe}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x7, 0x1, 0x800, 0x8, r0, 0x3ff}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x20000, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r2, 0x408, 0x70bd29, 0x25dfdbfb, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004000}, 0x20000000) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0xb2, "82d9c63e58df1ba9c718c2b2873c289aca065f99ffe0566165a15b62880853b6664c7730e86de590037325186a2df0d15e2ae9fb14e35bf27f26ac56ab86a73589f3659278fd763167d7ce7733c48e8bb83202c722ab30e55bd50ca34824ff4b774a8e630afa001e0ee3dc58e59db326cec590318de9b1979dc467baaf787338b764feb577e2e35055afdab2d1b98152b9c71bbf7411b508164ef509752442734cde133d52b81572643fd4fc29a03d10e123"}, &(0x7f00000002c0)=0xba) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000300)={0x1d, 0x200, 0x4, 0x27f, r3}, &(0x7f0000000340)=0x10) socket$inet6_tcp(0xa, 0x1, 0x0) 18:41:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:20 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) signalfd4(r0, &(0x7f0000000000)={0x1}, 0x8, 0x80000) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x2, 0x0) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000040)={0x0, 0xe3}, 0x2) 18:41:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x10002, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) 18:41:20 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f0000001380)}, 0x10) 18:41:20 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:20 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r0, r1, &(0x7f00000000c0), 0x100000001) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x9, 0x200, 0x4, 0x0, 0xffffffffffffffff, 0x101}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r2, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0x9) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r2, &(0x7f0000000080)}, 0x10) 18:41:20 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x2005, 0x6, 0x7, 0x2000000001, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}, 0xfffffffffffffe58) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) 18:41:20 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0xfffffffffffffffe}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x7, 0x1, 0x800, 0x8, r0, 0x3ff}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x20000, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r2, 0x408, 0x70bd29, 0x25dfdbfb, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004000}, 0x20000000) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0xb2, "82d9c63e58df1ba9c718c2b2873c289aca065f99ffe0566165a15b62880853b6664c7730e86de590037325186a2df0d15e2ae9fb14e35bf27f26ac56ab86a73589f3659278fd763167d7ce7733c48e8bb83202c722ab30e55bd50ca34824ff4b774a8e630afa001e0ee3dc58e59db326cec590318de9b1979dc467baaf787338b764feb577e2e35055afdab2d1b98152b9c71bbf7411b508164ef509752442734cde133d52b81572643fd4fc29a03d10e123"}, &(0x7f00000002c0)=0xba) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000300)={0x1d, 0x200, 0x4, 0x27f, r3}, &(0x7f0000000340)=0x10) socket$inet6_tcp(0xa, 0x1, 0x0) 18:41:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 18:41:20 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:20 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000080)={'vlan0\x00', 0x2}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40000, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, &(0x7f0000000040)) syz_emit_ethernet(0x102, &(0x7f0000000500)=ANY=[@ANYBLOB="82ad57620c07aaaaaaaaaabb0000d5c70a1d72abbbca2a6e5c05b7f7e9af996ad3c54469e9da259733816d24236e2c451f539da7adb51aba839535f9f17d61e395b9a308af312f3e67a19aa3797487d917bef280b958ef53e0e5ea522acfdbee6a17924dd13f2156a3460ff0668569f57ad8415f73adb1171cb7401ac30263d43061ae1cc0ce70e5cf66128a3cf5b69a9bf47ef6ac3ec47f8e2715b4ea09b99cd9afe075057d919726a8b5ec82a7017fd5134caf52f8c4dfa948492cfeb85db849f5b7f081f3e0a3b528b86f4582a148f6eb677c5f9f214caf8ef3159d7be6ad947d8ce536f34d3ebbccba40514410ed867c82623df86a6e64b25d9a6a68050c1fcab4838d23928850e1512f5b809f1e740c9014948ac1b8277232199909b4302c59fa09b054c8e770ab9ec4ef116e71c0eca87b55043e417fa7dffd8986986d49ea7c6d0c204ab3f54db0a19b7a321c6a0e1c0d275752aac2e85a164a6707ef30"], &(0x7f0000000040)={0x0, 0x4, [0x5fd, 0xc45, 0x34d, 0x1fb]}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f0000000080)}, 0x10) 18:41:20 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x0) write$P9_RFSYNC(r0, &(0x7f0000000080)={0x7, 0x33, 0x1}, 0x7) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r1, &(0x7f0000001380)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x3, 0x2, 0x7, 0x22, r1}, 0x2c) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000100)={0x0, 0x6}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={r2, @in6={{0xa, 0x4e23, 0x7, @remote, 0x6}}, 0x843, 0x6fc3, 0x0, 0x1994000}, &(0x7f0000000240)=0x98) 18:41:21 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0xfffffffffffffffe}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x7, 0x1, 0x800, 0x8, r0, 0x3ff}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x20000, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r2, 0x408, 0x70bd29, 0x25dfdbfb, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004000}, 0x20000000) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0xb2, "82d9c63e58df1ba9c718c2b2873c289aca065f99ffe0566165a15b62880853b6664c7730e86de590037325186a2df0d15e2ae9fb14e35bf27f26ac56ab86a73589f3659278fd763167d7ce7733c48e8bb83202c722ab30e55bd50ca34824ff4b774a8e630afa001e0ee3dc58e59db326cec590318de9b1979dc467baaf787338b764feb577e2e35055afdab2d1b98152b9c71bbf7411b508164ef509752442734cde133d52b81572643fd4fc29a03d10e123"}, &(0x7f00000002c0)=0xba) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000300)={0x1d, 0x200, 0x4, 0x27f, r3}, &(0x7f0000000340)=0x10) socket$inet6_tcp(0xa, 0x1, 0x0) 18:41:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:21 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x10002, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) 18:41:21 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r1 = memfd_create(&(0x7f0000000040)='/dev/audio\x00', 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000400)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x2, 0x0) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000140)={0xe, 0x9, 0x7, 0x4eb3, 0x42, "a3d37c9d49d76a6d358f056db982ed9f88b51ec51f7f7067fcc91b2811715bbc6a0369ba3b9ba51de0a2f157931a47b0a609980fd04a99ad6f5b96aefa76d1058c7d"}, 0x4e) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f0000000180)}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@dev, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) ioprio_get$uid(0x3, r3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000340)={0x2, 0x2, 0x81, 'queue0\x00', 0x5}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x109041, 0x0) 18:41:21 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:21 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x9, 0x0, 0x100000000}, 0x10000012a) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x3, 0x240000) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}, 0x3}) 18:41:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:21 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0xfffffffffffffffe}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x7, 0x1, 0x800, 0x8, r0, 0x3ff}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x20000, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r2, 0x408, 0x70bd29, 0x25dfdbfb, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004000}, 0x20000000) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0xb2, "82d9c63e58df1ba9c718c2b2873c289aca065f99ffe0566165a15b62880853b6664c7730e86de590037325186a2df0d15e2ae9fb14e35bf27f26ac56ab86a73589f3659278fd763167d7ce7733c48e8bb83202c722ab30e55bd50ca34824ff4b774a8e630afa001e0ee3dc58e59db326cec590318de9b1979dc467baaf787338b764feb577e2e35055afdab2d1b98152b9c71bbf7411b508164ef509752442734cde133d52b81572643fd4fc29a03d10e123"}, &(0x7f00000002c0)=0xba) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000300)={0x1d, 0x200, 0x4, 0x27f, r3}, &(0x7f0000000340)=0x10) socket$inet6_tcp(0xa, 0x1, 0x0) 18:41:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 18:41:21 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:21 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0xfffffffffffffffe}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x7, 0x1, 0x800, 0x8, r0, 0x3ff}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x20000, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r2, 0x408, 0x70bd29, 0x25dfdbfb, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004000}, 0x20000000) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0xb2, "82d9c63e58df1ba9c718c2b2873c289aca065f99ffe0566165a15b62880853b6664c7730e86de590037325186a2df0d15e2ae9fb14e35bf27f26ac56ab86a73589f3659278fd763167d7ce7733c48e8bb83202c722ab30e55bd50ca34824ff4b774a8e630afa001e0ee3dc58e59db326cec590318de9b1979dc467baaf787338b764feb577e2e35055afdab2d1b98152b9c71bbf7411b508164ef509752442734cde133d52b81572643fd4fc29a03d10e123"}, &(0x7f00000002c0)=0xba) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000300)={0x1d, 0x200, 0x4, 0x27f, r3}, &(0x7f0000000340)=0x10) 18:41:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:21 executing program 5: pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f00000004c0)=ANY=[@ANYBLOB="d2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r1, &(0x7f0000001380)}, 0x10) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000001c0)=0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000380)={'ip6gretap0>\x00', {0x2, 0x4e23, @multicast1}}) syz_open_procfs(r3, &(0x7f0000000200)='net/mcfilter\x00') getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x10000, 0x3, 0x100000001}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000100)=ANY=[@ANYRES32=r4, @ANYBLOB="62000000665ef5b6b2c377ed3c8af5b3baee9b4c114bd737d8765b0ecd6a18988add2fca1cdfafe6e101e0d872b49928ae4b02f9b3c2002281430607115d86ebbcd72e6bb9c673c834bc8fe1f97b466704bb9fefa48f01ae750000"], &(0x7f0000000180)=0x6a) 18:41:21 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0xfffffffffffffffe}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x7, 0x1, 0x800, 0x8, r0, 0x3ff}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x20000, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r2, 0x408, 0x70bd29, 0x25dfdbfb, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004000}, 0x20000000) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0xb2, "82d9c63e58df1ba9c718c2b2873c289aca065f99ffe0566165a15b62880853b6664c7730e86de590037325186a2df0d15e2ae9fb14e35bf27f26ac56ab86a73589f3659278fd763167d7ce7733c48e8bb83202c722ab30e55bd50ca34824ff4b774a8e630afa001e0ee3dc58e59db326cec590318de9b1979dc467baaf787338b764feb577e2e35055afdab2d1b98152b9c71bbf7411b508164ef509752442734cde133d52b81572643fd4fc29a03d10e123"}, &(0x7f00000002c0)=0xba) 18:41:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 18:41:22 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0xfffffffffffffffe}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x7, 0x1, 0x800, 0x8, r0, 0x3ff}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x20000, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r2, 0x408, 0x70bd29, 0x25dfdbfb, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004000}, 0x20000000) 18:41:22 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x101180, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000180)={0xc6f, 0xfffffffffffffffd, 0x2000000000, 'queue0\x00', 0x80}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000240)={@local, 0x0}, &(0x7f0000000280)=0x14) getpeername$packet(r1, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000740)={@local, 0x0}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000007c0)={'syzkaller1\x00', 0x0}) recvmmsg(r1, &(0x7f0000003b80)=[{{&(0x7f0000000800)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000880)=""/69, 0x45}, {&(0x7f0000000900)=""/91, 0x5b}], 0x2, &(0x7f00000009c0)=""/101, 0x65, 0x9}, 0x101}, {{&(0x7f0000000a40)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000ac0)=""/213, 0xd5}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000000bc0)}], 0x3, &(0x7f0000000c40)=""/150, 0x96}, 0xa1}, {{&(0x7f0000000d00)=@can={0x1d, 0x0}, 0x80, &(0x7f00000010c0)=[{&(0x7f0000000d80)=""/200, 0xc8}, {&(0x7f0000000e80)=""/63, 0x3f}, {&(0x7f0000000ec0)=""/202, 0xca}, {&(0x7f0000000fc0)=""/225, 0xe1}], 0x4, &(0x7f0000001100)=""/210, 0xd2, 0x221}, 0x6}, {{0x0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000001200)=""/156, 0x9c}, {&(0x7f00000012c0)=""/34, 0x22}, {&(0x7f0000002340)=""/72, 0x48}], 0x3, &(0x7f0000002400)=""/248, 0xf8, 0x4}, 0x2}, {{&(0x7f0000002500)=@l2, 0x80, &(0x7f0000002900)=[{&(0x7f0000002580)=""/254, 0xfe}, {&(0x7f0000002680)=""/220, 0xdc}, {&(0x7f0000002780)=""/71, 0x47}, {&(0x7f0000002800)=""/203, 0xcb}], 0x4, &(0x7f0000002940)=""/4096, 0x1000, 0xba8}, 0xffffffff}, {{&(0x7f0000003940)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000003b00)=[{&(0x7f00000039c0)=""/174, 0xae}, {&(0x7f0000003a80)}, {&(0x7f0000003ac0)=""/60, 0x3c}], 0x3, &(0x7f0000003b40)=""/50, 0x32, 0x100000000}, 0x8}], 0x6, 0x40010001, &(0x7f0000003d00)={0x77359400}) accept4$packet(r1, &(0x7f0000003e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003e40)=0x14, 0x80800) getpeername$packet(r1, &(0x7f0000003e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003ec0)=0x14) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000003f00)={@mcast1, 0x0}, &(0x7f0000003f40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000003f80)={{{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000004080)=0xe8) getsockname$packet(r1, &(0x7f00000040c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004100)=0x14) accept$packet(r1, &(0x7f0000004140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004180)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000041c0)={{{@in=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f00000042c0)=0xe8) getsockname(r1, &(0x7f0000004300)=@can={0x1d, 0x0}, &(0x7f0000004380)=0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000043c0)={'vcan0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000004400)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000004500)=0xe8) getsockname$packet(r1, &(0x7f0000004540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000045c0)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f00000046c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000004700)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000004800)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000004f00)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000004ec0)={&(0x7f0000004840)=ANY=[@ANYBLOB="80060000", @ANYRES16=r2, @ANYBLOB="020625bd7000fbdbdf250300000008000100", @ANYRES32=r3, @ANYBLOB="f400020038000100240001006d636173745f72656a6f696e5f636f756e74000000000000000000000000000008000300030000000800040000000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004007f00000008000600", @ANYRES32=r4, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004003f00000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040008000000080007000000000008000100", @ANYRES32=r5, @ANYBLOB="0c0102004c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e67000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r6, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r7, @ANYBLOB="080007000000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400898a000008000600", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB="340102003c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000000c0004000800fff10700000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000000000008000600", @ANYRES32=r10, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r11, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000400000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000000000008000600", @ANYRES32=r12, @ANYBLOB="15000100", @ANYRES32=r13, @ANYBLOB="a40102003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r14, @ANYBLOB="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", @ANYRES32=r15, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r16, @ANYBLOB="08000100", @ANYRES32=r17, @ANYBLOB="6c01020038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000600000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400f807000008000600", @ANYRES32=r18, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400aa03000008000600", @ANYRES32=r19, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000600000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004005f054a6a08000600", @ANYRES32=r20, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e74000000000000000000000000000008000300030000000800040001000000"], 0x680}, 0x1, 0x0, 0x0, 0x40}, 0x4) socketpair$packet(0x11, 0x6, 0x300, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFBRDADDR(r21, 0x8919, &(0x7f0000000000)={"020000653000", {0x2, 0x4e28, @broadcast}}) 18:41:22 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x10002, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) 18:41:22 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:22 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0xfffffffffffffffe}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x7, 0x1, 0x800, 0x8, r0, 0x3ff}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x20000, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') 18:41:22 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x9, 0x8, 0x8400004, 0x7}, 0x522e28c1444c0765) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:22 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:22 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x80, 0x1) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000300)={0x0, 0xe0}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000380)={r2, 0x7, 0x101}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x7f}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000140)={r3, 0x0, 0xfffffffffcb7a794, 0x3}, 0x10) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f00000002c0)=0x7, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r1, &(0x7f0000000180)="b8f4d1a213e3ac055054f6d5f8b06c2e5433382b758b01630f6a8877ceea39db56f7ba70e121615a0219551042a61be151c59da7c3a378a01ce0c23bd67f61436cbbf5e2ed8f4e607aa46debbe0e6380c58daa29c14d41d309d77f64dd47875bae4e4109", &(0x7f0000000200)="9f7580a126f90d07264721cae172a8be4551324a9f4ca356368e221a26c820b24bfe0c42f81d0efed331736479b2bf380970ed2000b700b747359afe2222b8f8b4cfbe8e8d8dc92345ef570c316052e657"}, 0x20) ioctl$TIOCCONS(r1, 0x541d) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r1, 0xc1205531, &(0x7f0000000400)={0x5, 0x8, 0x5, 0x80a, [], [], [], 0x6ae6, 0x0, 0x1e, 0x40, "676390253773fba1686f03da1c3b343a"}) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000040)={0x4, @local}) 18:41:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 18:41:22 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0xfffffffffffffffe}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x7, 0x1, 0x800, 0x8, r0, 0x3ff}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x20000, 0x0) 18:41:23 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:23 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x9, 0x5, 0x4, 0x1, 0xffffffffffffffff, 0x3f}, 0xffffffffffffff77) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) 18:41:23 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x800, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, 0x1000, 0x1}) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_inet_SIOCGARP(r2, 0x8954, &(0x7f0000000000)={{0x2, 0x4e21, @multicast1}, {0x0, @dev={[], 0x10}}, 0x60, {0x2, 0x4e23, @rand_addr=0x5c}, 'bond_slave_0\x00'}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000180)=r1) 18:41:23 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0xfffffffffffffffe}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x7, 0x1, 0x800, 0x8, r0, 0x3ff}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) 18:41:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x10002, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) 18:41:23 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) 18:41:23 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r1 = accept4(0xffffffffffffffff, &(0x7f0000000300)=@nfc, &(0x7f0000000380)=0x80, 0x80800) recvmsg(r1, &(0x7f0000000580)={&(0x7f00000003c0)=@sco, 0x80, &(0x7f0000000500)=[{&(0x7f0000000440)=""/38, 0x26}, {&(0x7f0000000480)=""/120, 0x78}], 0x2, &(0x7f0000000540)=""/55, 0x37}, 0x40000000) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r3 = openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x48042, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x400000000000005, 0x80) setsockopt$inet_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f00000002c0)={0x5}, 0x4) syz_open_dev$usb(&(0x7f00000005c0)='/dev/bus/usb/00#/00#\x00', 0x3, 0x40011e) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x2, 0x8000, 0x2}, &(0x7f00000001c0)=0x10) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000600)={0x9, 0x4, 0x2, 0x9, 0x2, 0x1}) getsockopt$inet_sctp_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f0000000240)={r5, 0x401}, &(0x7f0000000280)=0x8) r6 = open(&(0x7f0000000080)='./file0\x00', 0x20141042, 0x0) ftruncate(r6, 0x280080) sendfile(r3, r6, &(0x7f0000000040), 0x2008000fffffffb) creat(&(0x7f0000000000)='./file0\x00', 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 18:41:23 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:23 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0xfffffffffffffffe}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x7, 0x1, 0x800, 0x8, r0, 0x3ff}, 0x2c) 18:41:23 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:23 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x8000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, &(0x7f0000001380)}, 0x5b1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000100)="8e902302481be10b4072cfbfe2ef87c736356888741ed67ceea41312d4a574e56a97df6a3038bf1c00a5080d3dd7b5b345bf504d7338e7406550a894e5d68f2e5b0988a39e388151f9cf19c7b3fd22419a9118d520ef011d7756c4ae937c9dbdd127c0cf5e37ae5277052b2e63af7cb8beb91e26cf710252ef71b81f2d9ae8b4ce359875a4a392e5a06211d40a9d82e75de44ba3e71fa9c204e47abde848d3ac9ee17a484000fcc58d1ebcc923fcf8d5fde8a137e966e0926dd582ba2b99e747ef0ed3fc7765be4ebeb455", &(0x7f0000000040)="6660881d7ddfcdc1940a5fdb1e2ca15a51fc9611dfc01d7c82e1ec2d60b8c9744027186a645d4d0e8ce22de1d48a7b4b16e1de5447ff9b84835f8827", 0x3}, 0x20) 18:41:23 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:23 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0xfffffffffffffffe}, 0x2c) 18:41:24 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:24 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x2042, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r1, &(0x7f0000001380)}, 0x10) 18:41:24 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cfe9c65120b091f412cdfd9f58bbafce550defc2c31e83f371b14d08ba72813330edd39173dffaa6bd0267b46bc8f38c49d52dbb0d07ddbc4b5c016e4a95b75eb98d0b33c7850dbe0c87933590495fec9e3902dd3879ecea9e79a0159c36d918cdbf118175873e2f90d01fea197273784421f664482b3b6a674023a398bc9f54ae2d2d4d"}, 0x10) 18:41:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x10002, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) 18:41:24 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x9, 0x7, 0xfffffffffffffffe}, 0x2c) 18:41:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 18:41:24 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:24 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:24 executing program 5: setxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x408301, 0x0) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f00000001c0)=""/249) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000040)) 18:41:24 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x2ac) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400, 0x0) getsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f0000000040)=""/20, &(0x7f0000000080)=0x14) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000180)=[@in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e24, @broadcast}, @in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x4e20, 0x8, @ipv4={[], [], @multicast2}, 0x101}, @in6={0xa, 0x4e24, 0xfffffffffffffffd, @mcast1, 0x7fffffff}], 0x68) 18:41:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:24 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x9, 0x7, 0xfffffffffffffffe}, 0x2c) 18:41:24 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:24 executing program 5: r0 = msgget$private(0x0, 0x580) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) fcntl$setsig(r1, 0xa, 0x40) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x103000, 0x0) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000180)=0x2557, &(0x7f00000001c0)=0x4) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000000)=""/26) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r3, &(0x7f0000001380)}, 0x10) 18:41:24 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:24 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000180)="bccf36fe4364647c7754460ede0baa5a655ab8940a3d7f95395f871eacf92cc80ba9af2fffa9e2ac283e7cee5db6dfe846d187dd5b07b22c82e325aa4d7ae30bffeed2acc69022fd70f34eb0a4f60b5b70a3f15700e5234a", &(0x7f0000000180)}, 0x1e9) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f00000002c0)="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"}, 0x10) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x1, 0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x117}}, 0x20) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000280)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), r2, r3}}, 0x18) 18:41:25 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x9, 0x7, 0xfffffffffffffffe}, 0x2c) 18:41:25 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) 18:41:25 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x400) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 18:41:25 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4, 0xfffffffffffffffe}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) 18:41:25 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x0, 0x3a9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 18:41:25 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x0, 0x7, 0xfffffffffffffffe}, 0x2c) 18:41:25 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:25 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:25 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000040)=0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@ipv4={[], [], @local}, @in6=@ipv4={[], [], @loopback}}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000080)=0xe8) sendmmsg(r1, &(0x7f000000a680)=[{{&(0x7f0000000200)=@pptp={0x18, 0x2, {0x1, @multicast2}}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000280)="b645df406476ddd93978bb8a07e67a1bbcf53ecf4c9082575d7187518578427ed4f26bf8a7f5af86bb388c550565f77cb2645de85fb48ad67db767ac54ed5c74c63da22dc3df473e96189d7848012e3797fe8335287dcb106fd5011adc31df691fb3137ed2200ada33afca27cf5f7cf5c875ac82c243e2d287627ab58d9f2e86537bee4469bf6b6de1d161797dd63267de640666137b6c3f7eb0384e17928ca6108139564ad9daf021d76f397b847430d4da070e475eb79d107a68f6838284fa931d3f6091a407095ea3274a91be183e3d099674b23b922bcb907331a67280ba4fc0bc26dcd1efc4be46bd7940c7735a851920954112a8889b", 0xf9}, {&(0x7f0000000380)="fb5c61b8111928976492cbe2ab55b626f95df749bb4a4f3f1c83a37e338a75529ce6a797983ed62bfcad494ccb9d99a0bce9d5908c60d499da7b802bd2d1196aa94d64920035c3e50fcc18d5e4f589817ded69990f81932d0f5ca81529ace786795fdc5f6afc25316d6cdd813b4bd8099f9bd96a4ca3703dc170462616de96f0d208618aa20acdda0813a3776ea627440fb94b8a1d40cbfeccc665fd4423e3f91f404f5a6e25e86f1f4f44cd5a2ef68bc450787f9d8dad5153e834d30704e77d67fc14029cf14ca25b34108ae869fe7f806a9d7e98deb8e5044b88b6293d8fe5a7d8ad7b272dc64c325e3da5a6488045eeef4b53a12e", 0xf6}, {&(0x7f0000001340)="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", 0x1000}, {&(0x7f0000000480)="78e244cc8e20d958aa32f1c5cc3c463aec4806e01a2e0bce5301445d3dbb6aa69e87472db79a5db3fecc2ebe46ececd18194b7ddfaa09f3c618107bd2bd5ce88dcf142ee15e71c027dbc0289905f3bb19117c8df5388dad4fde18fc5fd350356a41a46ad685a67bc018df45514f06f3cbf7b418dfe7c8f2e77dce7df7437511f3794db6dda7993d3", 0x88}, {&(0x7f0000000540)="8c3427c776c32d9d1a0815b1b1bb76a80135bbfd7adfb7536d677dc786cd72d3865f7b753cbd7018909a6c29154569ffef6544037ea44d8f20355ae77660c83b8a316e46b7f61a0b4410dff10ef9a42681ea55e6301e181984d51b517bd1535cdbc300594a5c2294d31dd3f2e5cbdd794122039e28dc1bce1a3a0e3c7c527ad083000a639c6b5087a91d6b31406601e021d8c1754643676816054ceecd8b7b949b45666f71edf1d076b6c69cd5b9cdd28df3839301b3fcef7c2d4977eb5703476b1dddba37fd431b2a004644d9263c7123ba0aa29f8af7e1", 0xd8}, {&(0x7f0000000640)="6d664b078a9b6d675f23f6405aaca3ec92bea9b4166e9076c0633b35759cbcdc403067016b32934297a12ba5b0248d790a198c755fb39128b4985808b2661722e111b1f8032ad954f90a592ce7aca71b55453ac58de1475e3fc427b2af136f5c04b55587f1a1bc7961f944b49ccda49b2819d1c513eb52f65e029d9cbe60788e8c9db95c6cc77565525530b06dd4abe040b5fabbead960c200e9ee5ae5b3c0b7104a973554ed072d354539242a47903e6d523affab652e8621b4d4f5cc0a6404662bc0457fe30f31202e5a29486e4c28985f57dd66550e9763dab93dc6809dd8e8", 0xe1}, {&(0x7f0000000740)="c1d4b19246ed3890bf1be60c259b453d078417b3653219420faa4bd99fee0c18013e5f0044", 0x25}], 0x7, &(0x7f0000000800)=[{0x20, 0x84, 0xffffffffffffff29, "feaa3e6d1246019f908bd8725c5a"}, {0xb8, 0x111, 0x8000, "b26fbf970762ca74926e93c50ba97b88d68efff012ccd946b020e706eef2f6dff341bd0160ddab9d25a0d950060fd857d32e1aa1d2b69aff40693fae8fff8b7b913d6765d90d99988d1f217647386feb0aaa514712196d212f3bb6c775293f4813625ea28373e0310d831ed45172660e27ce414955d5ffbe5a07eb7f1feacc55b39725b9310bacda93c84460a277b5cd1b7689dcd3743d18cee03adcea561260cf"}], 0xd8, 0x4000010}, 0x28}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000900)="5568e2bffc4d10e4548fbdb422b167e4d74fbb230807abfa2a2288781515c1088e7b50d183a0eb2d167c", 0x2a}, {&(0x7f0000002340)="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", 0x1000}, {&(0x7f0000000940)="c48a70e581812a633a39fc2f2642df102639cbfbed360ad48ee6992d55ff97206d38716908f6f88c081a9aad51b70c776b5640b3f5a1deb4469f31719ecaafce8282957a3bcbd3db9232", 0x4a}, {&(0x7f0000003340)="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", 0x1000}, {&(0x7f00000009c0)="0ad943669e5239a6267cea91c6b40bdadff4549d4786903b8954332c9826ff60dd20f07148ce09af0418e3eba0bd41c0cc169c95a8d88d0880fd48bd937d55a8b8f9df3ea800063eba328ea75133e20aefaac5b96db2a7b4a8915d8fed1af93e81150fb6281787300313c652ab5a6904e07ca5333820f2f0e91c8f473c48c3812b481da7980c63e4ded5f0d35238561d64897102d0f5b346", 0x98}, {&(0x7f0000000a80)="db8370f75811583ee2460155bc8ca26de92eb0c2a95318848fa637adc688ecefb04690ed74cc2f", 0x27}, {&(0x7f0000000ac0)="ec5ddc14939964628a30b4c1e2bf9ec6402e59a1335f17031919668da3e4ba8e2c89f0e59c5842cd1f20a416b96148a09f279171687ce92b219400c502c6ddbe46587d29a5b222153d737bcdaa6e3912537849c56dc12ecdb650ccf9b5003f4635d46d", 0x63}], 0x7, &(0x7f0000004340)=[{0x28, 0x113, 0x10001, "d8b7b82b3d878fecb8ae61ad0807e78f93"}, {0x1010, 0x11f, 0x5, "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"}, {0xd8, 0xff, 0x9, "20c3d51ac504469c9489522698fbcf19699552c87750df6f2f95ee1fc66cc27fc6be3b1418577edb772c92a25e7e3cf90f5721d8a3b40876931c75a808ca9b77871e118b7122542ae509a79534ae86b0bf5efa3b687f95892280320410725b56e289939fd03744576394507f0d61d781d3c1e52741bf1a7dcfb28798c637ac519e35972cb15eae8f6228759bf9926a0c20cd070ba3db9c5f634b50c14adedfdcfb498d83c7ab43d2146adb940d67cba573e5b7374f987b08d549598e2e25dfd1ebd58ff60ac5a058"}, {0x108, 0x116, 0x1, "6abe292417ca669d79d2ed03f46d0ae6a2acc99e64a63d1d76a5aee23defb9b474d32b5050187b0ac4602427cb227f50bb1143f19289381d345a842fa6fdc44fcd1a92e8cb2cdba0fce6a73d352e9617b8efa3dd51bc38805c2d09cb931f627691a0a19e09daa022638645f216b70ff50fcf5363c8c3814bbd66d45300c33e5ddcdf2953d885dc95f9cbecae1d701c241acd8fdc69e14b442e0080d2a88b1319da2a3be808144b3edebbf116512c9d908460e9f03c217f15e870e28f62a524f8f8b9b8de2bc7139136fc038baf6b3a2b8b6cd5d3bb2926df7a26dd56c3956a2e1e7cceb99ae48ec77d3556fab6375e1974a2d70aa4"}, {0x70, 0x112, 0x401, "ca170cdceac697c1e2c7865fb8af2f5a1dd1a38866137dbb94f84aeb7782a717642a128c61b8d957d6da37f61aa3ce915fed4a371dbb5eebcdf976bc9dc89bae122d6cfdba95d1105487bbc92854428199d12e3ecaf1dca278"}, {0xa8, 0x117, 0x2, "f055b1984a9c0121b36611736d9ac555a3670d495e17f2c11730d007300581c6ad0e5e122ddad6203bc9e40233f7a52d99741a65e71f63e87e37dab277e344e0bbd811e1324ec7ec952851d154ef439367e48b77d180196f534a3cf4b25c039df8b3b59b8a9179ac2ad92d4309842ada3356ad1c39cb31b1115f2b9925c6d45569454ca7117f374fb11978f4c2bd4d05fdf24823"}, {0xf8, 0x116, 0x9, "9724216ea0bc9ca2c644696ee9f0f7c86a8a7a28c0377dc119cac4cffd6129757e25c676c80b564228ca547df0a4e7f1bdd033cd44326ae79fc2bf17b349963de2b22591a7445b289c9c6fb4713d0837329e129cfeca115c687e3f49ad3fc3f64608318e567566f1641cfba1b3d39eeb813b2e73283df87f3f116d1b854798ea166d1f71d1a9823fbde397808c1973f61350e62b926db10a7c1e0019b21cc6e0715a7415164c8e5c9916144e92a11bc0969df4586d0f3c195a0cf79ee372f58e4c6d0807eefd1672302662404bc305c0cc617afe72025fe47a7068360a2233d702600fec"}, {0x1010, 0x84, 0x7f, "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"}, {0xc0, 0x10c, 0xfb5, "d9b7886b4a7ce4d8e01e1ee80f81f0cb58c25976a63dd7b6d8b2336e3d2dc0b3b30e40872f735fbf0a281155bee795fd0d09f68f97ae79cba6f590c7c1c8cda7ed0303f2eccb44515214546867560328beb9ad9593eb86a3aaa9320b442859fb4e54800c1372b8c5a17852221cc3cb7c37d4c14f0c409d249700c7ad295eeaee83cf00433c03f164b17e7ddb2a6e8b36a6aa538aa442afff7d54738d5e86c4e67ce5a38d4c1336ed22faaab5"}, {0x80, 0x10d, 0x11, "9d2280ccabeb523d56cc25f7a18ed20985ef269f75015049db9f03eaad02a60cbbd4b27f17ac0cda83415c78690ede7fe2219fd467058064bd2e777ce1f73f9d9b5885a7d2c367bfdeb231ae24beea32e1593c16874704b72dd2d7e79a642f4a51c1a1aa276d443d7acc990de5"}], 0x2578, 0x4}, 0x3f}, {{&(0x7f0000000bc0)=@in={0x2, 0x4e22, @broadcast}, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000000c40)="6f83b7adc1de23a24421454946d3ae5fe4e07e0351f8010493c153ebf761f25a7352a04dba7577ad6b8463aa7aee556af6d38e6407e0216fd9cf751c1eb6100b9a7891c237c3dff67e07b8aeafea0b2629b0dd1a83c0857a7086052474e33d48e6ab8fecf7e60cb304c17a8e3c85758ebe", 0x71}], 0x1, &(0x7f0000000d00)=[{0x68, 0x12f, 0xfd, "518c7ff186ba6add751ba0ce7640e1c3bf25edeab9fa1126728e025cc3921e336dfaf9f38cbea5a74ebb1fefb685b1bffc587dc13398b5b89429f6f2bd69cee6ebf35b2db161be1c98f01bce0822f76f320d9ec19badad"}, {0x58, 0x10d, 0x0, "381b2fdf23f569df1357609f8c805ff030032dbd1a8b52d2d22a9a2767ab3262a3a12fd3340edd4023f4f2dc97e06bc7758f1bf3e4d05b399b68e94dcedddae5b2e03bfb7951be"}], 0xc0, 0x44004}, 0x7f}, {{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000dc0)="16947b3fe17a02e1cada064c0e18a36f2059e53d", 0x14}, {&(0x7f0000000e00)="977f6f77b7b3142db4cf074f05d6cd84da6d8ccbe66607a058257fe36cb05eaef485d364de70dc12ed86b546f2b532974dd8cce91842b9f081e5ae97efb017f14d67933c600a249e77841dc7b0899f6836d63b95fec5a906171cc3751df97747004c032e13a19bd45a12fed33245a0bbdd4e2a", 0x73}, {&(0x7f0000000e80)="8ec2ebcaea2659907dae7d0da96fd546e7f300c486423c928de83a22afd62bd12a05dc61104875ea35fab833dbebfe78aa3b8bc16f", 0x35}, {&(0x7f00000068c0)="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", 0x1000}, {&(0x7f0000000ec0)="f93fef89e6e0d27ceced8e42ad13b7079c17f9e74ac3190664283ad21f7be894a37d30e0237ab919", 0x28}, {&(0x7f0000000f00)="f68cbe00aa1757c44c81ec5cd94de1d6920b2dedbb60f1804f8b2a93f2845f1b43f41bf0e078b5c9e716b0d6ea0912f3e42bf8bf4eb7dc060b8aa4ed721d5ce04b65b7f90bd85e5e5aa570b414c5efddcb4ca001b89bf25b25e474523aba905adb1af72f755dc280421924df31dceb9f15fac6bbbe0a2b9edf6d3b83f4d25a69a3c187a991a2daad59570e1706b10140a84f3f9c34e67a38e157b1cc76ccb533c9455c13fbe8f1d160087f4298f81e", 0xaf}, {&(0x7f0000000fc0)="2d1cf75e63977e9ab0a1bc2a7d1b6a5cf34df9fb30f63f37b2bf771712e9d36a27a3db360c24a9fe658b831e7d84c9c6d91939fcba121c53b6edb0a6947d5bbd5abc5a0fd2316a32b778838826603699e66346b160e602a26553463062743859e51bc26d62f0551ca1099949fcb902624c972a42289705e0fece37e1fa54f43435e02cd6a723825286780045e90e66530c77b8fe9b82c78cde4d5efee9241e3db59b81d85feb483fea602e98575c828728fa100d4adc210be12aa7f7a2cc6511b99d3cdc2cdfe50c38ee", 0xca}, {&(0x7f00000010c0)="7d794f12019970b72c00d21c1aeebd51cea252c00a6ae6e246ee14575dd480347ec02164b2ce9f8339dc0abefeed226ec53470be760cebca971de067fa07f6142dcdba5ac565af37dd0d3acd111f428e0bce46ebe5e24a0c0e568451b2492adf54cceb13c106725f53f147fc72174b18c85ebc0366115ecca4bf18fffc80a345b1a7a0c9333719b95cbf6b11eaace53a3c8f557877b592bd81364cd38efcbb44f6d738cba980acf781d7babdfb", 0xad}, {&(0x7f0000001180)="39d2d1be74906931b17de6b27aba25703d0207ec3d7d44cf8f6d466c8ddd2880bb2de23ca01b362e7ba54245f7748eade0b1dd3d5fb3d9", 0x37}], 0x9, &(0x7f00000078c0)=[{0xc0, 0x0, 0x5, "74e35a018d9a684c9ed3af0613e6c081029916f2a514f695e222f77a8092a9710e60b87576c2b7a5bf8e374b9d9c345a4bcce2c8443deb5ec86c22c35effcb60231c4ec0faa81d515df8b97e7c4adf2ba034d4ce6c0db142c099d6f2962a27947619cf914e164a49bec1e37aac31cd55ef7d88bdf76666659b58634b6b88a40c8847a880aa41aba314723fcc7fe10dbad0fe4e03302cad3f5a98f59ffe557cd4bdc0919bb038f7700dcd142900a59983"}, {0xb8, 0x11e, 0x1, "0ea51861fedba7df8cd0a1803c45411afc5d0100aceaf8704b7c4e0533d363214fa2cbfa5dc4464c4f7539c125beef160388b655144683527c1c311e0a958b28d702e53a96f900cd16c9f2c90d3e340daac9704cb4479e268298937a661ad6b5aa5b081af6612f6fbd1528677c0ee367e188e6e5b5e9c65f54f73e4f95f21d8c216fbcdaeaf6cca542b48d7cd6bef7047a20e086f35b3329999c1cb4fe7c04f05b4ae25b99c9"}, {0x20, 0x11f, 0x8, "8987be4ee86763ad7e35494e838e5f"}, {0xe0, 0x10b, 0xffffffffffffff80, "2ba908be56e72bba874b69a10295ad91b352cc31dcea189b4e0d1439618f0acdcc0fd7992270c978bd72c4812c10a335ceeb856985bc7ff5de810b9b55758663720474c0e2193fdfc1e97caf5c8d32c4bcbe0312fc563def3c660430540766014a6cc390fb5f06ac34a5d20f6bd55140180bcd8cfc150ffe537df29992476dcdda1e053f79acc597a0ac8709bd0d45e49c420b28d8085834157a2de1d5fb25e75d100633de733e4d836ed30aeb0be79cb6c9225604fd8ecf9d80948d66ab3a012099184aa9a542ee21"}, {0xa0, 0x0, 0x0, "fbd7b534b733056852d22b0a04410b635e32e0cfb615a4e6fc0b28a2a5161981889b4e85004a76f4a7f59af81cd27da9ce5a4221a8a8ef44432ae5343698948ccc250d16e2d4d7d8a8625a8012f771dff30006ab56254c90cdae10542534f56086f069b4bedfc306318665a7bcd40224da02f142b4e65b441c63ffa0e10e077e8cbc6863c4808b65feefee280c14d177"}], 0x318, 0x40040}, 0x9}, {{&(0x7f0000001280)=@nl=@kern={0x10, 0x0, 0x0, 0x2}, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000007c00)="3ea3a5b2a02495d5f6d99cae40ffe29d", 0x10}, {&(0x7f0000007c40)="883d3fa1ed862ed8faac1f057c6618ddf1c823b96b46e4492c04992385a739494e9102249df0e1bad44d802ee8780ea82dc321ef949df2cb0fa5a881", 0x3c}, {&(0x7f0000007c80)="a81620b63eae203bb7931817bf6f34b72e014ca716d2e4b13cd89afe38cd4aae6b822887d5650c5b01c58da29ee5df7d21f4df72092b8cfccf6b4ffaa27d3f990be7c582bb67d8ac679f9bff84d63524c5023b2e5f54171f88e7004ea6b3fe88d654ad53b6caf5530aa9d0110759a73f35c1f5d394c435ae2ff5967af1720dc82a69df059af00b57908433665c469a6019068d3b97690cb70f3ce3a3941d4bccf40600849cbabf679ea96bec7a9bd578b1b4222c2fc0d2cb55b84cf5eb0fcdb16827dfb0c7caa4e15f0533fd7fd87c8dc2d8deb2c5045f8ba399dcc65ee53e50948d4e55557d2804e75b285bd713", 0xee}, {&(0x7f0000007d80)="79a2986825e75ca54bcfac86da1d1de1b799987230ada9c0570bbbb87f6d3ce141a867230b883f41f70cc4dc5710e13e37be5aedfb6e26bc65b0a2566d", 0x3d}], 0x4, &(0x7f0000007e00)=[{0x10, 0x13e, 0x3}, {0x70, 0x29, 0x1, "a6e1551e25704c88721abf2d994e71bdbd8872c4b149414173f7f83b5f6f43a2c3dca81a5f9d3405dab867dba97fb757f7d658b13d899fc71dfe8d3b41ea9779abdeb636ca441b7b3be801702003d7216c6db426ebc6550e0436"}, {0x38, 0x11f, 0x4, "7557618197932b9f5a9eaf1643a0e765465fc5765164b53351462200b4cbd3d3e3ee8c86"}, {0xc8, 0x116, 0x5, "6533c0aa26d77e94d40bdd185f01408adf70a34f847c7662694f9f92eabd28e241b03cceda9e959f24a306862a6d66bdc57ec2cf81dc2e6e680a49570057ee58c437aac51e814954aa3a6139ee161241436feed3075b77c533dfb753c1fed328fda62c126d4e7cc19d9d7ef0afb4d2e959fa107c154dcf7ff898ac65c4cef1674760c2d64d4f8c1fdef93f05ddc908b0762a26fa8807861586741980b45ed602508824ea0431551d6353d71e3fdf2785a7"}, {0x38, 0x10b, 0x7, "86c4e699bad4f4e835a2bf3ff919d554c2ea4b2c4428fce1df724a158a4e87808583"}, {0xa0, 0x0, 0x81, "e636482aafb670eadf1d273b335a3b8613e428e8c11373c294fe3dc2f3277678f35d4df0c853bd4cc64dc637626fe8a08c1b1afb03965ed5ab65aa4f08183122d0ed48fed637c4b7ba62f1f107ce5671eff9bed21f59768a76e6e9ae32a4f8134a694e8bfdd6c6d451f982a3d0474eb335ddfa16b575f87f94047b215cb0f5ee37c6137c1cd5e6ea0be4a5b5"}, {0xc0, 0x0, 0x28000000, "0676dbc815adbfff2ca15804707f8670d48441047eb57397a71d3b3712a1a55fc157685eb8e2f48184ad317e3057b443e51564704228de11e07fb50cc23fc013edf5ec4c62050d99a55cc6d392d24d59b37a018e36a6607dc76bde879d032cbe233d645c5123140ef23269e71eba89cb66eccc75f8da011021e49874d1ca77d36e781a5e11d3ad061a3d4aaf6c033c4e5cc3041e41991594e32d19491346d657f42a6a90b2f8d49fe63a105064"}], 0x318, 0x20040000}, 0x1}, {{&(0x7f0000008140)=@pppoe={0x18, 0x0, {0x2, @dev={[], 0xf}, 'irlan0\x00'}}, 0x80, &(0x7f0000008740)=[{&(0x7f00000081c0)="24495e5ad476349f40c6dc06cb4502af3cfa95fc1f5921651b59904d3dfc563f546922e388f898bf1a458dcab1d0a4fe179626dabf444ba5db46b0806c372619002bc9465da4431c270975f9595b5fd74ba77e496086c80a1dd10956294d24e2e8cfaf2a70b930a828603c00f37d037fb2e91128d1bfbee97baf5e7065c19429190dfd7101993184063251c18ba2843995b976504fdec2c63e770771bb50a5b4a3e84937ec63d7389b830cb21d45f4bcda548ad6d0a64ef76464f903d754f94f1e6e8efb34120497b3aec760d074539df72250ac", 0xd4}, {&(0x7f00000082c0)="d8", 0x1}, {&(0x7f0000008300)="81db345f721b80f00c4a03fd0e5fed6dba96d355a20ef020724366241c2c939309553bae8404b6c9443cf511a4df46f1cd2901f44596b8489b1cc89daa18332429f69399c0fb03475c3381c80906a775aa484092b415ffcfcc329111c9e1eb32d6c8870769b6d1f818cbc613a116cb3f6f528c909da37711b3f58f493c307273c485573226ac9da101ec31cd16bd52af046cdfc31d617cd42b4ccd69269660274f7c0f52ea69bdcdb6ddd777619376f22830c1fc422f90e8c6", 0xb9}, {&(0x7f00000083c0)="31b0a78a56320a29f50e19fb7bce04515a6d5cb23e835cf50575fa51a7f0cf5858bd48b58ae274f937a1efb8fb18f8845fd8e41905c517140c3d145ada5d39209e3c10759bf3a3c1ac507124dfe3e1217ea07a8c401edf60", 0x58}, {&(0x7f0000008440)="e44c5d6d170c01915755d9505d2109fabd956b1e68343e112c08db20b382f37dd0285510a317be1d91a03a2d3d42a25abd66dcb6dd328e454d6d3d3d6af0b4266dd70e2c5667f040b8c50f3dc991080f208bd80331be26a216", 0x59}, {&(0x7f00000084c0)="a1df15d3d1bacf341f46aebb0c7f502560b4e701d1e6292a2f89020c783e0a87066f204299c15a0e96e9704e9fec00c31e178684605c23e58c836b232bd820210e6a8090978dfa297c53a743f75f5f57dafd6df9d7456bcacb803b26a1e4b292e2749d8d635c01960e6f2c77b2dc8ca83fded52525c160207780b9f948a807e6f3ac20b2188abbd6e2000f37547ec65a402e193b855b748fbe26d18ed2003e77dc5666c7c174bda6a760f5a7eb4791c4930406de90d1af35a6b38f0d44749acd0c377694d08e3cb915cd983714035cd570d1f08278053b5aa757c5857d", 0xdd}, {&(0x7f00000085c0)="ca3565f206f728dd8fece048c629a19daf8570a433b8da0c3bb6555efb4e9965e0d782288264f2fd1f5d51baac6bfa7c62a695df170eb0e0d8ff8d9f893581446bf66d2f9deeaec7d548bd26366fd1a3480272679ecd4323189c90e5f9e82c93783317555192ed35ae6d6e9dfaf360288ac53b79a863530dca931ee7b24aebf0f47e747eacccd5b406fcf2afea26", 0x8e}, {&(0x7f0000008680)="8f113f8e508dcfadccc2db7b1fbb4fc5a15ba950728fc9460de1e149c5b85ad05d69ee69f56232377676015f8440c39c70be02010c0bccc16ece5ce4040b676deb70624390790f0115bca8e56fa487c909fe588680a0088e64fc449827e89304ae262e90e886c119edb1b23dd91b70e1ade54b5dd63e5bf9e3673a217004d63a1ba689d2ead94a5c2f676c88e50902ba44de55f09126f2183d48acb3d49ff686e9d23fbeed825a315e6e7ec2878badfe562466076d1e53f8", 0xb8}], 0x8, &(0x7f00000087c0)=[{0xa0, 0x109, 0xda24, "0a9473ac3b94fc29e03fadfa9a8b08dc49ab0925f625804338e129961ff3d510845cc8d102079f980d3478977354784e2a67026f4ca4db804664d6f6053d09086bedf5ae4153d8d1ab00e85e23b81d1b62c77be3d9674c25bb0574571b4db2310cb96ae6c7c451ee017c641ede86dfb96e60bfdc1ac0096996476cd6d74dfc9570409696eddc0a78d3be452788"}, {0x78, 0x10e, 0x7, "9f2e241ae6a11789475e45eda00ddc4025613eb94bbf69c12924063103345b9ffbe86ba7d165fd82ca71393b5fe8e12ca1e368fd8f9180ab51d753b31aa99c06c1236f26a0c6cda6a84b8c204da1ab2efc7ea2cdfaa79827ca9582811f5dfc7fefd89c6b43"}], 0x118, 0x810}, 0x7}, {{0x0, 0x0, &(0x7f0000008c40)=[{&(0x7f0000008900)="be583478d9ab543435105cc105a05c981aba3550e066d798446e05cea8a9c59cd426", 0x22}, {&(0x7f0000008940)="8fbcf0574433a89d7eaf1be4597072e218d860e846db42120b1d35139dcb4dfa303fdabf98f644c5407078440c77bf4902154af30f5b0d7ea2764ef3a90689bc502c001a92", 0x45}, {&(0x7f00000089c0)}, {&(0x7f0000008a00)="cf71e972a4c66cb84cafd098358816621d20ddd33fab7f967b7b4e7ded4907234b14d4544108078f3fc2dc85c1487e97a9b0e8256a29a70aa6fbde3aaa14ca341b7ef7df382a848b71c7d0cb5efde977b29d266b5127563e46c755cd9d0326f9779f929667", 0x65}, {&(0x7f0000008a80)="57a173a5051aa9f0c6a85431a2ede3b309e1a65a552b0e8b54bbc185d97dd25c9d903ea9653a3572aa9fc1a912f83e0b842a8c489b75d242fb09b464e04534393d37cba0a05a91eebf0dd273998d1aab373bf4efa0e767b31f2f5813ebc352447c05438acc03861d393851068f00589bc3a7cde9933ca197db9f972fda05c4b387fb2df36da57f1e72df977f9b93ad1e70e935dc51b783a0e4129cdb9941adf4d11c9a11240eff0ffd43c662c1ce2d6f289854ac187cedec59225ee7dcaa997545bd", 0xc2}, {&(0x7f0000008b80)="994af0826fcdf270a3cf8372192929ab7d4df2eec5fe9a5776e311f16dc02f28ab902e53fa04d699a68b43678c87da35f445564e89eb2300c167edd533a3604570c26b21ff1ebf22d77e2fd93b07", 0x4e}, {&(0x7f0000008c00)="359092de329c8fe7da84c0e621cbbb93e5594abe7deaaadfaed691f82f3a91d0e107d8a7218c1b4c33", 0x29}], 0x7, &(0x7f0000008cc0)=[{0xc8, 0x0, 0x9, "063b33f94ee3da3d8dc40f8031b48cb37abe25ae674de369f16d43b4625ab75622a96e4472a278843362696fc9e5ffe40e222a81acedf09bb8e9eb5f60ef0f1870db2f39fac3e3bc3294ca3e99d8a83078e6732bf28c76b7dd85165457c79a8fe16b5631043905c53790d429e3686db6a87a992e15b603db66b736b20089256f58181b85580e3c019467bf118efcf92e17f485eec393cd27a8cb22cb419cf44ebaeb8376fda463fac0fabf1160a03d6ca89c065f"}, {0x10, 0x88, 0x7}, {0x1010, 0x112, 0x3, "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"}, {0xe0, 0x13e, 0x2, "7739307c83af409319773d537ac9370601283a3036705380ff321e43896aca60c43630b5021e8597ebbdac997660f4eb12592014d312ef9ed6398621a9fb76f3e5d4b5d0c8a86e2188a0e4363dca7cefc6a17db3b94716fa1aeaea387a745aac355c94fae20a604cf8c0d771aa7bb96523159fd2877f14eec760adaca04428e9e094f99289e41f88be1b06d608583cd664f22b7462c991169f1343ffdbdb8dcaf3551e5e74d9360e74829e49b21e9e36804a1f9ebcbee3e836e35aa16ddc1aa6dc9c36d707ba90544e60bdb6327a90"}], 0x11c8, 0x4000}, 0x7}, {{&(0x7f0000009ec0)=@nl=@kern={0x10, 0x0, 0x0, 0x40000800}, 0x80, &(0x7f000000a480)=[{&(0x7f0000009f40)="1551f4b5d680ba69df413b9934db80e11aed34d4f83671f7bcad0bc6fa9e64b136cca1d926c78f37c93568be5c52e6a3c0347be58f7b2b17c664e6871cc75e966d86b485f24943b22e29d8e77b4f93fe9767b33f73e5dabe5cfa1842885d20f96c9eab6f35b722602c92f3506dc0d34feb71ca8c774c3190d51cf6a07ac304434026fdc2ed8f3d13e6146ff0f22334cdca7d813895c296a6692c231b0ec3d5a83d83535f02ad39d0c89b7d4c7cea7a62944356a48543243f893612", 0xbb}, {&(0x7f000000a000)="dee1147fe8a983b5116eb463b9da7b724b6a0efb105893a30699b085db0e1306ea0080cb2b9839d1af49042da29a4145b8ae7c527dd07947c0bb88c5e836d536e09d05dd621aa1730382e536c8b9b7bb2d4a61a64959d59e09c93745c68cb7ae452d86925d745492a4d4c2b4722dc8a7d09313fca98ffc23e2b3fad3e22c677055e5716ab08ac04160b211f3e2006f14aa85a46ac2eb90a8aec97f179d0a9de21ff423ec271d4dde75422a5edfb08c07441e92f24aba773ab9d0be9f616a899e3c56ff2b04e304b5a0ab590d23f7", 0xce}, {&(0x7f000000a100)="3bb393a7fdf40bd3c77eb175342622d937eb4f156cf5415c0d065d1735742fd7a9ba2c212a9989cfe3cc3f8e622032bb430a0264de456a7a610a0625d8a4e98297292a7903936dee8ce30f0fef360f6d2d756e4808196b14b1146aebff24b3d9728095baf2f9e77d508d2d16832f3ad742939cdb3bec801dc814c49b4d2901aa426697f4012de573de5d7201bc0fd619a22497b5bedc74e8bbe8d57b47d6d74d01ec6a7b9358af3412b1dd5b4fc9ff7fd84da350f8f0bad9142d8b14daf4195e33dbd7f79411412d40091fa2941cbacfc0d7991f996b4b118e0bbbb1d1e51ec439e158c02054bfd632ef3525da4ff0b87aeb34cb", 0xf4}, {&(0x7f000000a200)="728206275dbebd", 0x7}, {&(0x7f000000a240)="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", 0xfc}, {&(0x7f000000a340)="cc7694c4c79364bb6d55e853c42f1255b3673b04d2d5c0e2dd5af240035369acefcb8552a942f5013e198d6136d3a3ae445dc6bcdc67c8122a17e7cf2ca7d7b4bb35912014919b8da89ad62a199a5e4a81d2b9b89491cb22535da1f76e5490e3e0566624e1736798ff8615882624eca2c887c0649d1f28bd18dcf56dfa299aa3154316fe", 0x84}, {&(0x7f000000a400)="1585857a6c9bc629eca76fe9c886cbf872c9ae24ff6bf09d9e0ce93b53d4e5a5cb37375106838c9c88b697e53d09b5769521032cc3084227335763880afc9ce358866655d6a7d66cc441980606604a5d798a267564ebebbb171dfb053f1f7e7bf22185798ee8316aec28c81cdfd069", 0x6f}], 0x7, &(0x7f000000a500)=[{0xd8, 0x115, 0x1f, "e70a447541b12cee01f8d26fc78cb4826d78e9f86ac248de8d46318a5fd016130301ecfdfc875dbd23298389eb1ebef454830cf9ca5f475497dd909c1de6119c3dfa025f3dc11f1d60519ff00101a31c031e93d0f895e889dd5bd5fce44d18c55e323294f2e1b694a0f1a6486e006b19316989561f050ce0465d42671649b66d1fe1c4387c96008f52deea7bdf6ddf4a2f6a8a4514768f8f48d0a17cffc6f3fdc548f0c954c49b131d605d33d6a2e6a5667a6b8a375319ee68d433ae3fc309b9c7f57359"}, {0x68, 0x100, 0x8, "45aa2e55294491e0e9445173d9492bda678571090578b1ee7c7ff2ce7ad86d3c7cf65ed2a33438d1f6be4373928a5db86541b377b971c103de68de179cfb50b7fc382dbe204a98eddd46ae9cfd239de491cc65f8cf5200ba"}, {0x28, 0x109, 0xff00000000000000, "78bfd757d7a8c2548fa47ce05634099e57df4033e073"}], 0x168, 0x40c1}, 0xffff}], 0x8, 0x0) 18:41:25 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x0, 0x7, 0xfffffffffffffffe}, 0x2c) 18:41:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:25 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x3, 0x9, 0x6, 0x200000000004}, 0x2c) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x5, 0x100) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000001280)=ANY=[@ANYRES32=0x0, @ANYBLOB="00100000594d5cde010ae3791390d122cbbdac867dc4ed01a1595a68a3207ecbc2ea442cd401a19a03d52b0e0403d227c9826f28888ebc60c719656173748449d8eeb25349536a81688108522aaeea397ae4f76b48ebc2e37c5dd301db9b5c8a5c90ba41d2bed177a297cacabaa0c101ad3731f58946a60b3dbf2969cab01fdfd3562b8479a777fdd0f7233729338b101beb8f0a10b8b1bee9c966b6cf12ba4c635423e480a834592bb95801671a33e31c527fca5d47cea0617cc508c045eb4931285321ecee176f95ccf6d17e8b1e806199aa393f54ffd7c099b8b0cbd7b0c70c4c75e9b7ed0a3db161135a8779ead9c0eb6da3190e3d18d03964a08522b628d9391578f695df52bc8c37089e958eda486ad6f56c7aea258dff89dd7d0eae05e45d081e1def171c05ff5bb6ee01beec10c1d4d15fbc7a25f6fd9b70a66189c0b08b6564d204e012f56d2c4568ce110d9f5725023f3406c4c0ea8a3db3a96b50e51b3e71e4b7af4c124c74e884415803fe58e5f7cadabb6da7ef6c03bc5f861dc68945dca6e91e0ba3820a512c4316964fc148012505ecdc71fca4f3f430f8002d8866cbddfa3f0f4a2550c5e06db1255aed3fcf333a716f2e26c576afcf28c5d1a19f91a48ddf975037fa5d66efeb68e1a5b3574c41913a97404694b18d13f3c8c779528cb3fd589f0dd9de5a9f11c3b4dfb52412b16fc33461119d6629e73d697dbf0da6944169c5effa171577cf986e6af108d8a3c5f02fbd92407d61e4f03d7e86548e748debcd06d727e712b07d7b6940ea1daa0c33071be66d48b1f9356270bf0bc5b16415f31cb3e0f293b448dc0b8cd1bcb4fba791b5e7a0bbd779c935b7325f1ab05c9b1dcdbe8ca143bb667f4f9b1208cfa4649dcd84cc370e92a2bc36d1b850a66db41809020c1aed4384baf96b75bf43d3fd70078e8650a035b2ce5e6249e52408e37dc5b08def85021491558f87545d794fcea1de6a73e524f4afb79fdebc6c1d262c613df80eb5142e128e05b11406f9f07f1771d0d5fd029728d74b981d5679a0c50d86cebebf0c292cffc43f6132bb7770c83ceaf9462e1bd36d91740ddb182693471b5d00bb4dccbd12b218395fec43d1df22dd3468f799f6b53992695569ceb075a8db72a6b506dd2b95f6ea5b6b5e695925578881bd0bbdcf6918aab663bdfedfcbae799526e3ec507afcbd26c5bf9c6c068ca1dd005862ea48a4a1f5189c2cb36c0f79f5edf1bfcb96851ba7e76539b35c99d50b19b1d3f93ac0a0075982e2ac7b89b09417b1c0ac4dedbe4f0223a21ac7ee1ddcc114e47674906bbddf44a4d2904f37db059a84d24c753f5351f4f023babe2c46aa0453c55c54483fe7b602770d2f4f8e2496d86667ecf008e105ab6dba40f7679b0cf8ec4972590372fdadde9d8f965f43de3d12f6563b9f60cacc08241c1e7f070e4f31eba0af5ed6ae6ca1c03d1782acfaf9ceada0be322cdd0701f940b7edfb1c00f88321475f2563f3a107e8aed608883e8395d0e2a04fc6359f6011bc17590c531fbdd08d2aa1ff0f433780f69a4472ea73f37cc9197a981e107c32d761d29061ac5d2190fe908aae97841c0471766fc254f3204800000000bff4e9715ee52a70461f25f9a892b56c11da44ac8589951a13e3576bad3a609dc819c33baac979217fb7139f2264f53f56fab982d1259e2071483045676470fa8b724c26b0a53a52b73266259cef6fc2afb05b01e7ac2a54efd86424eca485838643453de131e0ccaa1eb7925dbcf90ead7ad42d3aec5506636109b52d01e3053c65ee2fcc11114a9f5cdc7b4483de8f7d9613a121939963deb840fd28ada5504a0b33233c765cb299ac6a0cdc59583f44fa08f6cc1c0dab05aa98274150c17a6471dde5b16d31608a1cb3265b4114d4bb6e1fd0c940850b175e1f0248a212c84c2d30c625b518e07ce80158e23f0edf3a6d7ded252e90a213c596807d416269d074b884fb0a6d24fce75c76b13595bd029a668f2664c356063c09806507fc0e916862c569904664842b8d0ece6b393f69779359628db6c99c7c743964e2016246e39c97832a88896815e9255e039123669bec4114a26506e83c4e0e0d0229221e4885661b987f238eb0796c7d6e8631ffd69c97b1ef4fd0cc7af4cdc69471a5b5958b9cca346795e496159b2fcc3974014a3bc25a4c25e75fc0330080e5deaf1d5d7a5bc247d24fc319869d73ede104c5f984f26f91d814faf578039b9a3efd8318f4083c2890aa4356e0585387250e1df9d78c9fd8d88fb6f7b70d7dd9f60eb4888a45b2721fafe68d1ca73484bf460fd97a256be8412e8826340cf6a5e1350371b8238e8c8349f1baccc9fdc5776a351e13577de832b8e313d6c9342265164045115ffd09db7bba5800f5a78967894abc9b4ef52bf2ef6227bd0d73caefda37fa27654bf53660d8a0d0a2229098e662e70d0df2eddd7c895d500aa65d5018500c4b273e12ab250e36f7a1c26e3afc62f40af0b0b39307e61b26a7de0b4e4bc34b9ea3ceb471442d37ff6c8ac0b60d901f69d78e6f4114aa39342b046b3128e2b24d6f6fb94d17fc3a371e3bfb23b1a63daa06767ad63e71064bb10b3e6a04bb3ae688382457ed246a623660a2b73cf4289ef9e1d119fb30e6f0b240ceb12d5be6df785bfe2d319d7e433ae90723d54d39da499f325c9dd665b58bb40d79ae33723c6e6f38b5362a7e4759bfbcad8129cfd14893f828838ddcff8a0ae171f187f6ed3432be5c4d464a5c99754e9ed5fbbee4d30d6df3253eda4b25a33de420be6e3ecf4132d912d6352d636e76d784b221bbf7a25959d7e79747c3b83a897423bb940227be3d8ab52c58610d9fe7e2177a17e9c4d9ff0e85a06460ea5fdf33afeb9418e82f8e9bfe9dd000a25f275d9b361538bf95f5ea91e01e75c5df1cad2c599750edb9679ce26eec0799a927a2946017d857fed09738bc28d2cd1424c6efd575a28a650b473a475e1a6b370d5843869a0987b190d45baa9c6246547c0ccfe6b4b991bed9ae7c8ff9c64fd87fa17c2cb3596d29c4c2a24234d9c585d1573ce31e705e3b6228d64a6700c77667c6d31ad1fca170b89b14da9ba5d31a7ff4547892ebce306b156492a2f80ffc5102ca9cf0e2ac365af78c44ce748d7d8bc665a6013ab465c17a4b4df845fd30ddbcf94e2435874fb0b209e4e9b5edb3294aa462084913498ddd972da7203edda572b55243bb3734b4e36cea30c91a312e7466616bd1b58ed6c586efd5827441fcc86567cea8efb263b00015dd1612025c313916f16d39b53c7e521b2bdb1014d447a01bbcbf0dfa2c318b7307d36a80b73594813d9462b54eda3e960d4022da5f4b0402819ab0c15cac0aa8825a7c5f41fd08f71aa2efa3d838b367f9e82591f31fda8457f8e6c8be45383d4507566e42572fec6dc804a65eefc70e745cbb78d240c7f630356d99738064d26d19a604216e3c4ef10a20f85ddd067710fc488b57741df27174bce72b9bfc5545e3c7c129ace9aa144ce0da67f775d07eb77bb152d8003fefa16c100297e000d9ac5277de102e35bd946d3c86db31503ea9729b35521a76aa9b413ccc1bb997b8b102afcf2c68a38776799382fa2ec884a518b8062a324a35793fa9b415a0d21479c05862bb36a43710dbc8c43ae62d784b8cea860f53f50e93c7928c241599dee3159a88f702341de47d4b85e25de4d414725263cfb0ab6a026d61c3d37aa2f6f7bf020d0f37991b69ca3f5c5b49daa924baa4bddc331d2fd937e58e6918d1dcbfc7413f1f7972d445b24d65a0b32544dfb17e10d7b747c5c5c6d43e96acefe14171df3ec2163c99bb9a78e1adc8c3ecd950b35c64f4d75778bbb1cdb988a2d95651c497275ad1ab03329595a72bf51b94bb4762a6d89c038175a59c0a3aa9a9443d4d098fbc1eaf4edcce39d9e24700a023b93db22b00315e0426d89ab5ccf511c3f29089cbac6179ccac5131ae5b8fc7ad53b19ac9598533add48a0e3efc3c1222a37f6bd03485e9de0023ff62981712aa9d155b0a5bd9be5f8b7bce1ecfe366ffb5352b715b3e21dd556f2452bdba1cc0ba0c3e4a46f05419312ef1cd8eadef46a1c6c9301c7d209044274ac250256a39bccb737705410a1c2df05d7027f0bb2716d5f7f3258b688e7463e08443acedd49b89df3a3631e13fde7ef013baf8af5f68b3a558f4db277a14ae7d2cb930031bd12b43c497d74a7cf724eb554a1d693992b0655b0e79471c93e98121818afee844e471abb2ca92ccf1dbcee471fd7203fe9e829246650728d4946419ae0665bc108ed085ed541ce84f4f9eab5060a7a5442779011c0b52576203de12c5c93d9c1b66ad7c3d201d61f7484e86f33e5788d7ff9b44dea5650e14cb00debdb4b8c3757c7faac0d5f1fae19803003c45698989ae4491c7f047fbe566ac1e5d78560134084fa11cf7805daa7129bb0a6ebccc90e774e2d1bd6ae89b2c5cb95133c6a74ccbf9146595bcc9445ac71cd7cae5c39c780217ae151cd3e068d68be9737da5ad2628ec01b853fb1b9879796326c2875d938c14571baf2cc5c1dcd4e8cf6b01c2376350c2f649893ee8292023b1f00628e162dddf00a189d9536ec6ff6fd80df66ee4838be7b12caafd0253fe41524028635de480f77ce031928ef42950aef014d555d9570b2bdc676a4153faef7745fbd2a40c1fa8ef09b7d6f2dbe731ae95cafc18619729b15a02a91c515895c604251c8c80ec1c1a023442c17f284053b3f69f7343a288fa9eeb7dd83848601b0aaa1f05aa8801f105cc04389d5a0fb2c034ba7b4b01dd6923c63cd945c226f56dd3801b79146e3c4991bdd3fb0295c32dafdb1f844bd21c107d2ab0cd67046a3e73aa6b59f663556a26b89b2d994f73bded44bd6033ea7583d9f8825ef06d75a74faf87a56f4f7232dad897842b2396a86b3fea363380e77c939cddd204ac34e05bb68e6a82d7150dc88c687fcee3878eb088aa7a468eebadd19c58681eea1ccf7a36c396b7ba96eee3ed61090ef47625908a824600eb16edc9089d941561375b5f21a549edd8af17a3b92d4ab57f86408be597fa84fe0b49713e973be46925e6bab652637f0063430a67052acaa0b25aeea73d0e0beb055ee6a6ee7349ba0d458ec583e441148cf93c7d0f1e9d5088ef9f0e38b4b0edbe01939c8a26f277f80210d265cbaba882ad4a403df650147e5771b193e142520b57b03e39101c20f6ba75fd6213c3a25bf310196f8e73cd127f097389280daf26cae6a6635c038b4a5555f045f9a69c73ff311d89494e37685b0efccee41ec650a63b2a7ab37bab81401994fbf5a5f04c7763087eae906e95d00db870df9e487f62d8c1a1cd148aaccce878a482442b518825d4b3077d3bbefd3750c2ac09346044140cda63c261ef91bd0903e56dc2737380551cf5afc58efc1d3cf68e1959d9724f0709f041ff08c428b406bbab7505342ad41c773c86f3fe3a297d51d3570e59b1eeeb90127bcc5c58f0fa3b4f5e2b2ec2448a6e6bc69a3ed71db9ac35f005a0ce9257672ac82cf05ae16232a32833b9d437a9a9cee10dc2ff2834fdf55c0285576691968c05000000000000005d54409a71bd61516fd3ed59e941059cbd414670e851b7ee8fd8bd9f0f1d112affb4f2cf1f44bd6bb64c7e0fd13b46d60fc03a3b0b624c6f44a53bdca475e2535a0fe2640e257c493ed8971b391846c7c100caa214d6e6b3fbad087a78126643f3b2a61a74ef3b1d88489911a5d9d86cbaaf2b80a732a474f3e30dadbef632fc7b673b1dac900586580a5ad0a8403766553e06105d2821a2e3a6eab3aba678662f66a2feb786d7d4c88d"], &(0x7f0000000180)=0x1008) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000001c0)={r2, 0x8}, 0x8) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x400, 0x0) bind$alg(r3, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0x58) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:25 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:26 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4, 0x0, r0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r1, &(0x7f0000001380)}, 0x10) 18:41:26 executing program 6: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) 18:41:26 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x0, 0x7, 0xfffffffffffffffe}, 0x2c) 18:41:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 18:41:26 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f0000000040)="c767dd9e8a569e7f75e0b9e1480af180dcdd4ef1097ba314f84c22a26597600cb0079824eecc9de527b3cda20f8e0bb99038b3b3a2238b45c1e5923e649f859b6280957532f15574789b1f48aa838bba7520578dbdf7aac8696cae5bfd21"}, 0x10) pause() r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x2100, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x3, "9bc9f7"}, &(0x7f00000001c0)=0xb) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) syz_open_procfs(r3, &(0x7f0000000300)='net/arp\x00') getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000240)={r2}, &(0x7f0000000280)=0x8) r4 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x1, 0x200000) ioctl$BLKRRPART(r4, 0x125f, 0x0) 18:41:26 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:26 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x113) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="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"], 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r2, &(0x7f0000001380)}, 0x10) 18:41:26 executing program 6: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:26 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x0, 0xfffffffffffffffe}, 0x2c) 18:41:26 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:26 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f0000000140)="bd0a709029b6e52f5634e445e4980e070c1f29d9a4fa4af751306de80c03fcd41f48d511c500c230d5c7c185613e8b4b9c284feddabcb5a15e0d39ff5c9cb6435b1180218cce43d2d3c1243211883143987f971bba41a03c525310e185db77acd9699689a08e"}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x3) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x6, 0x30}, &(0x7f00000001c0)=0xc) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000300)={r2, 0x3}, 0x8) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) recvfrom$inet6(r1, &(0x7f0000000240)=""/187, 0xbb, 0x1, 0x0, 0x0) 18:41:26 executing program 6: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:26 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x0, 0xfffffffffffffffe}, 0x2c) 18:41:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:26 executing program 1: r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) 18:41:27 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 18:41:27 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) ptrace$getregset(0x4204, r1, 0x4, &(0x7f0000000100)={&(0x7f0000000040)=""/126, 0x7e}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) 18:41:27 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:27 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x0, 0xfffffffffffffffe}, 0x2c) 18:41:27 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) iopl(0x3) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) r1 = dup3(r0, r0, 0x80000) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f00000001c0)={0xffffffffffffffff}, 0x4, 0xffffffffffffffff, 0x10, 0x1, @ib={0x1b, 0x1, 0xa109, {"ce38748cadb354daa223ab1aa61b0bc9"}, 0x2, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f00000002c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000180), r2}}, 0x18) r3 = accept4$unix(r1, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x25, 0x2000000000800) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000380)={'veth1_to_team\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000880)={'nr0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@mcast1, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f00000009c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000bc0)=0xe8) accept4$packet(r1, &(0x7f0000001fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002000)=0x14, 0x0) getpeername$packet(r1, &(0x7f0000002040)={0x11, 0x0, 0x0}, &(0x7f0000002080)=0x14) accept(r1, &(0x7f00000020c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000002140)=0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000002180)={'veth0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000021c0)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000002200)={'syzkaller0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000041c0)={'dummy0\x00', 0x0}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1b, &(0x7f0000006080)={@loopback, 0x0}, &(0x7f00000060c0)=0x14) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000006100)={@remote, @dev, 0x0}, &(0x7f0000006140)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006300)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}}}, &(0x7f0000006400)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000006440)={{{@in=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000006540)=0xe8) recvmsg(r1, &(0x7f0000009400)={&(0x7f0000007cc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000009280)=[{&(0x7f0000007d40)=""/82, 0x52}, {&(0x7f0000007dc0)=""/208, 0xd0}, {&(0x7f0000007ec0)=""/120, 0x78}, {&(0x7f0000007f40)=""/228, 0xe4}, {&(0x7f0000008040)=""/4096, 0x1000}, {&(0x7f0000009040)=""/138, 0x8a}, {&(0x7f0000009100)=""/204, 0xcc}, {&(0x7f0000009200)=""/103, 0x67}], 0x8, &(0x7f0000009300)=""/198, 0xc6, 0x2}, 0x120) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000009440)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000009540)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000095c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f00000096c0)=0xe8) getsockopt$inet6_mreq(r1, 0x29, 0x1d, &(0x7f0000009700)={@mcast2, 0x0}, &(0x7f0000009740)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000009840)={'vcan0\x00', 0x0}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000009880)={0x0, @dev, @local}, &(0x7f00000098c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000099c0)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}}}, &(0x7f0000009ac0)=0xe8) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000009b00)={@remote, 0x0}, &(0x7f0000009b40)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000009b80)={{{@in=@multicast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000009c80)=0xe8) accept(r1, &(0x7f000000a400)=@hci={0x1f, 0x0}, &(0x7f000000a480)=0x80) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f000000eb80)={{{@in6=@ipv4={[], [], @loopback}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f000000ec80)=0xe8) recvmmsg(r3, &(0x7f0000019000)=[{{0x0, 0x0, &(0x7f000000ee40)=[{&(0x7f000000ecc0)=""/185, 0xb9}, {&(0x7f000000ed80)=""/140, 0x8c}], 0x2, &(0x7f000000ee80)=""/134, 0x86, 0x1}, 0x1}, {{&(0x7f000000ef40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f000000f080)=[{&(0x7f000000efc0)=""/187, 0xbb}], 0x1, &(0x7f000000f0c0)=""/207, 0xcf, 0x3}, 0x9647}, {{&(0x7f000000f1c0)=@generic, 0x80, &(0x7f0000010740)=[{&(0x7f000000f240)=""/242, 0xf2}, {&(0x7f000000f340)=""/227, 0xe3}, {&(0x7f000000f440)=""/50, 0x32}, {&(0x7f000000f480)=""/248, 0xf8}, {&(0x7f000000f580)=""/192, 0xc0}, {&(0x7f000000f640)=""/4096, 0x1000}, {&(0x7f0000010640)=""/233, 0xe9}], 0x7, &(0x7f00000107c0)=""/4096, 0x1000, 0x4}, 0xd019}, {{&(0x7f00000117c0)=@ipx, 0x80, &(0x7f0000013a40)=[{&(0x7f0000011840)=""/4096, 0x1000}, {&(0x7f0000012840)=""/22, 0x16}, {&(0x7f0000012880)=""/62, 0x3e}, {&(0x7f00000128c0)=""/11, 0xb}, {&(0x7f0000012900)=""/4096, 0x1000}, {&(0x7f0000013900)=""/228, 0xe4}, {&(0x7f0000013a00)=""/27, 0x1b}], 0x7, &(0x7f0000013ac0)=""/30, 0x1e, 0x1ff}, 0x9}, {{&(0x7f0000013b00)=@l2, 0x80, &(0x7f0000014040)=[{&(0x7f0000013b80)=""/131, 0x83}, {&(0x7f0000013c40)=""/223, 0xdf}, {&(0x7f0000013d40)=""/182, 0xb6}, {&(0x7f0000013e00)=""/111, 0x6f}, {&(0x7f0000013e80)=""/211, 0xd3}, {&(0x7f0000013f80)=""/85, 0x55}, {&(0x7f0000014000)=""/23, 0x17}], 0x7, &(0x7f00000140c0)=""/197, 0xc5, 0x100000000}, 0x7fff}, {{&(0x7f00000141c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000155c0)=[{&(0x7f0000014240)=""/3, 0x3}, {&(0x7f0000014280)=""/75, 0x4b}, {&(0x7f0000014300)=""/95, 0x5f}, {&(0x7f0000014380)=""/82, 0x52}, {&(0x7f0000014400)=""/25, 0x19}, {&(0x7f0000014440)=""/4096, 0x1000}, {&(0x7f0000015440)=""/192, 0xc0}, {&(0x7f0000015500)=""/85, 0x55}, {&(0x7f0000015580)=""/39, 0x27}, {0x0}], 0xa, &(0x7f0000015680)=""/101, 0x65, 0x2}, 0x45da6126}, {{&(0x7f0000015700)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000016780)=[{&(0x7f0000015780)=""/4096, 0x1000}], 0x1, &(0x7f00000167c0)=""/106, 0x6a}, 0x6}, {{&(0x7f0000016840)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000169c0)=[{&(0x7f00000168c0)=""/28, 0x1c}, {&(0x7f0000016900)=""/50, 0x32}, {&(0x7f0000016940)=""/34, 0x22}, {&(0x7f0000016980)=""/51, 0x33}], 0x4, &(0x7f0000016a00)=""/222, 0xde, 0x80000000}, 0xf0000000000}, {{&(0x7f0000016b00), 0x80, &(0x7f0000018e80)=[{&(0x7f0000016b80)=""/117, 0x75}, {&(0x7f0000016c00)=""/4096, 0x1000}, {&(0x7f0000017c00)=""/4096, 0x1000}, {&(0x7f0000018c00)=""/206, 0xce}, {&(0x7f0000018d00)=""/43, 0x2b}, {&(0x7f0000018d40)=""/38, 0x26}, {&(0x7f0000018d80)=""/229, 0xe5}], 0x7, &(0x7f0000018f00)=""/250, 0xfa, 0x8}, 0x3}], 0x9, 0x20, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000019b40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000001}, 0xc, &(0x7f0000019b00)={&(0x7f0000000c00)=ANY=[@ANYBLOB="b4080000", @ANYRES16=r4, @ANYBLOB="080029bd7000fddbdf250100000008000100", @ANYRES32=r5, @ANYBLOB="8000020040000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000001000040062726f6164636173740000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="b00102003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r8, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004008000000008000600", @ANYRES32=r9, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r10, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400e1650000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004005b00000008000600", @ANYRES32=r11, @ANYBLOB="400001002400010071756575655f6964000000000000000000000000000000000000000000000000080003000300000008000400888a000008000600", @ANYRES32=r12, @ANYBLOB="40000100240001006c625f74785f6861736848746f12703e3388569ee97070696e670000000000000800030003000000080066bf", @ANYRES32=r13, @ANYBLOB="000000040000000080050400", @ANYRES32=r14, @ANYBLOB="800102004c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000001000040062726f61646361737400000038000100240001006e6f746966795f70656572735f636f756e74000000000000000000000000000008000300030000000800040000000080400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000200000008000600", @ANYRES32=r15, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b00000008000400ff000000080007000000000038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400f9ffffff08000100", @ANYRES32=r16, @ANYBLOB="640102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r17, @ANYBLOB="74000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000004400040000100701100000000400070762020000010000030000000000ff20077f000000060007ffffff0000010003fa08000000fdff0000020000000008feff0400000038000100240001006d63617374000000000000000000000000080003000300000008000400000000003800010024005a66d3bf6fe0be3a74735f726566726573685f696e74657276616c000000000000000800030003000000080004000100000040000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000001000040062726f61646361737400004008000100000000000000000000000000000000", @ANYRES32=r18, @ANYBLOB="b400020038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400feffffff3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r19, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r20, @ANYBLOB="08000100", @ANYRES32=r21, @ANYBLOB="f4000200400001002400010071756575655f696400000000000000760600000008000300030000000800040001000000080006002979493b7ce915c9ffe939c7f37a23d42f95bc0109338d0fe6936676249697d36073d3e15eaa6c82913209de2550d4315dd87971b7144cb4fd6acdb477ca9c8621e3b2d9225d262d9b5992319458bf5eca34a6c968c2c6fa225472c76f36d23241660c2c4c42246109bf5b55bafc6a616a903ceb70afdf9d949d94107112848fb254dd6f7863078c15b0bfda4989d41bfa94141ea88ed4a962e7c91fda0cb0c8e2af07becc01929efb669957669d6ff4dfc6b30902d5353054bdbcc0a2", @ANYRES32=r22, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r23, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r24, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000900000008000100", @ANYRES32=r25, @ANYBLOB="ec0002003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r26, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r27, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r28, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004008000000008000100", @ANYRES32=r29, @ANYBLOB="b80002003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r30, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000100000008000600", @ANYRES32=r31, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e74000000000000000000000000000008000300030000000800040003000000"], 0x8b4}, 0x1, 0x0, 0x0, 0x800}, 0x0) 18:41:27 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7}, 0x2c) 18:41:27 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 18:41:27 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:27 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) socket$unix(0x1, 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f0000000140)={0xffff, {{0xa, 0x4e22, 0x4, @local, 0x401}}}, 0x88) 18:41:27 executing program 1: syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) 18:41:27 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7}, 0x2c) 18:41:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 18:41:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:28 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000040)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:28 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:28 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x0, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:28 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0xfe) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f0000001380)}, 0xfffffffffffffde7) r2 = dup3(r0, r0, 0x80000) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U-', 0x81}, 0x28, 0x1) sendmmsg$unix(r1, &(0x7f0000000680)=[{&(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000640)=[{&(0x7f0000000480)="7f6c82215366dc6c814007958b0b5572031e7640b3dde2cabb7cc9271ad500b7f78c0fba7220035f83eaae9531b91e014a040b3c287f2eb41ef6fe1880449bf2cfe64f00f835aaa33dcc22216ff8dc845218e2f5deebe11f52c4ef70f4cfcccfef6ecad4506159f7bca858356c3f813be6701663e07e6b8272ece0b65161523ea56780a723be2e43247f8be4b18ed7044013970f43835cbb29a21aa36e540714e983261cef9d3ff34731a8744e88dc02abda7fbe2c2b514e4b0527e4580a63f3b1ddf68ba8824b94f587f3b14b1296d38da460b7c2", 0xd5}, {&(0x7f0000000280)="670b18bf39030eedaa6f8d02", 0xc}, {&(0x7f0000000580)="d1593341697287607812221441ba5625119e2b856639efcd0a02d4686094822984fd9c2f5d1a9b2c127c4870ddef2594b973320a4dc238debc0e94c815d766c1781183617e907c", 0x47}, {&(0x7f0000000600)="a7d74acfe0fbbc0b36", 0x9}], 0x4, 0x0, 0x0, 0x4}], 0x1, 0x4000000) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, &(0x7f0000000040)=0x2, 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000140)={'gre0\x00', {0x2, 0x4e22, @rand_addr=0x7}}) write(r2, &(0x7f0000000080)="fe4b8193db0e055c", 0x8) 18:41:28 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7}, 0x2c) 18:41:28 executing program 1: syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) 18:41:28 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4000, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000240)={0x4, {{0x2, 0x4e23, @broadcast}}}, 0x88) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0xa4, &(0x7f0000000300)=[@in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e21, 0xfffffffffffffffa, @mcast1, 0x200}, @in6={0xa, 0x4e20, 0xffffffffffff7fff, @remote, 0x6}, @in={0x2, 0x4e24, @local}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e24, 0x6e, @mcast1, 0x401}, @in={0x2, 0x4e23, @multicast1}]}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000180)={r1, 0x1}, 0x8) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x480100, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4, 0x80, r2, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r3, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r3, &(0x7f0000000080)}, 0x10) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f00000003c0)=""/99) 18:41:28 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:28 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() r1 = socket$inet6(0xa, 0x80002, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000200)) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x30, &(0x7f0000000000)={'mangle\x00'}, &(0x7f0000000100)=0xffffffffffffff6a) 18:41:28 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0x7, 0x4d, 0x1}, 0x7) 18:41:28 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x0, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:28 executing program 7: 18:41:28 executing program 1: syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) 18:41:28 executing program 4: 18:41:28 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x9, 0x7, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000240)="7c1f0b23885ede9130f28e202ac5c8d6a218127c985caccf80c92843c0f40239d0bfc70c7b5ef4bb6582d96599f5f1345de92658e6f69816025bdaeebf0cafcf63290041b45a34bb6e9f068009daab618c653937045c041b5eecf53641af798cf7ba8335262352b56639639ec2c0d565388cc219ffe40d1ce45a3b3e3dcc9838bdc414d80babcfb093dfde9cea605a60dad7afbb157a387c1192e01fb265a9fe545e49dd6ad34599ec52c0c2f08c52e5c75a1f02924b343774c6eb01bde2f76d05", &(0x7f0000000180), 0x3}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:28 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:28 executing program 7: 18:41:28 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={0xffffffffffffffff, &(0x7f0000001380)}, 0x10) 18:41:28 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x0, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:28 executing program 1: r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x0, 0x3a9}) 18:41:28 executing program 4: 18:41:28 executing program 2: socket$bt_bnep(0x1f, 0x3, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) socketpair$inet6(0xa, 0x807, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x2, 0x30}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r1, 0xf8ad, 0xff}, &(0x7f0000000100)=0xc) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080)}, 0x10) 18:41:29 executing program 7: 18:41:29 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:29 executing program 4: 18:41:29 executing program 1: r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x0, 0x3a9}) 18:41:29 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000140)) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x2000, 0x0) ioctl$UI_BEGIN_FF_ERASE(r2, 0xc00c55ca, &(0x7f0000000180)={0x10, 0x400, 0x6}) write$P9_RREMOVE(r2, &(0x7f0000000080)={0x7, 0x7b, 0x2}, 0x7) ioctl$UI_BEGIN_FF_ERASE(r2, 0xc00c55ca, &(0x7f0000000040)={0x0, 0x7, 0x8}) 18:41:29 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x0, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:29 executing program 7: 18:41:29 executing program 2: ioperm(0xd2fd, 0x2, 0x95f8) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) r1 = accept4(0xffffffffffffff9c, &(0x7f00000002c0)=@in={0x2, 0x0, @broadcast}, &(0x7f0000000340)=0x80, 0x80800) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000440)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000540)={&(0x7f0000000400), 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x58, r2, 0x4, 0x5675, 0x25dfdbfe, {}, [@NBD_ATTR_SOCKETS={0x44, 0x7, [{0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r0}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x4001}, 0x40080) getsockopt$inet_dccp_int(r1, 0x21, 0x1b, &(0x7f0000000380), &(0x7f00000003c0)=0x4) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000100)={0x0, 0x730a}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000240)={r4, 0x44, "12aa6d8f002b943ccf7220284b5d6829a27d6961839c68b9b363aaaf7e2f07c277a75ece62b7d36dfae6fc93fbe90f5017d44a8a2d6f64dadedb7142596c5e00b345c79d"}, &(0x7f00000001c0)=0x4c) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x6001, 0x0) ioctl$PIO_SCRNMAP(r5, 0x4b41, &(0x7f0000000040)="b6d2568545f0bdb276d1ce727d0a81111361664ea86da562354f1f3a3f7d89deca04f765c24fc4b07b92a3453f2157e8") 18:41:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:29 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:29 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f0000000380)="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"}, 0xffffffffffffffb1) 18:41:29 executing program 1: r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x0, 0x3a9}) 18:41:29 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x0, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:29 executing program 4: 18:41:29 executing program 7: 18:41:29 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x4000, 0x0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x4, 0x8, 0x8}}, 0x30) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:30 executing program 7: 18:41:30 executing program 4: 18:41:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000040), &(0x7f0000000180), 0x3}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:30 executing program 1: r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff}) 18:41:30 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000100)={'raw\x00', 0xfc, "3b89c803ffc81577df21df82355ddc46f4bff6059ef1020df5486447f7f0d7ac9a6c916bee22acaf311a6019e1d814e931fcae7de246f54721d9dc4bf68b81b45819c807a19ffeaa0f8cf6da09cd01a30c857cdf360c9c28e67a481d9c217fbe25f87a5e6df41e3d4e76affd65529a4d0ba0e7950f4c263b7e982247b57b9fddbd756232d1ac10a1ee7f35ba6c6785c6c30a61484acae9bc6a5350f1ec5f8941ac50e9c8d8b7b034fcd9fb532f58430472fd8ae8992d20684a2acd61ca2e44f9b38f41e72591febe29b59d7194085a3ee5145718637042bb334539d1a2af9a7bf8760db9ab224dd0c8b6e3a5c1df751c652bae8c0af8c4eaac5a7956"}, &(0x7f0000000000)=0x120) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) 18:41:30 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x0, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:30 executing program 7: 18:41:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) r3 = getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000180)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000900)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x694, 0x40, 0x100, 0x70bd27, 0x25dfdbfb, {0xe}, [@typed={0x8, 0x65, @str='\x00'}, @generic="9c4bf060f02dc4a2cc615bffa935ebba8d88c05c5c782399dfa1c70be030bde90ed71192e554c55a308d083cc6751e274121b648d2db093f52af8ab0d4d99989a88f583efb1a4c6dbd67e3c58bce32fffa0f294e179ae6d9351bea94c3f03147a3a2bbd771bade11f3b826d56099b3b667d68e8a3b19c8de2027235d4230af929cf09c48b7e6f072db719b05bada5d1fd9ce8e3e6a9472b6d922e0d1704a75bb43ce316b488d3d7a5274c97dda46f2d19606d7aee6cf237ef5bb601e91c9bb9068", @typed={0x8, 0x2d, @pid=r2}, @generic="00dceed0347cc5ab92ac17a7954260c69857f495b7b60c5938746832ee3345a6ee1ce9e84663df88c1f32ce2e0713b14e948bc0125b79eebb7d5d24015736a010e01b572eea01253a37abab91dfc2bcf984be53c09f1ae5e9a1e6cab40ca4649fe74d86095cbb46ed3ec8af8f52443b8d89d3b3bbedbc8a82324b618f3321dd68b8fc729c5e379d196cfbe9a89a903acf736ef8eb4c69a1e8398381c041b4996086f5a62b58ea039a91a668eb4c28a00968260e8b39b9c246ef6b2023a0bd538b9d377a19cb7321f825d5cd8c939752046f48f4afebe78d3", @typed={0x8, 0x11, @pid=r3}, @generic="98584c4db1b8a1eefecfdd0788ce1294afd455501abeb3075a6c1f4d26b4aeedd717a46468849371ed1a6064fae82d048f456cf6278f84a7fafa8d7d6a0e179b402477f2660f2e5dcc528b9194ec73e8d716c2db99e7751b72ce90e89f5a135d82a79fccda4a7d00e1175ff341e26b45f9227ed233ff7d880aa51dea016fe45d8c3109de5b8880d311a517c7a927c49b0d612e3b3cf3337b148fa1717969c06fa779e460e27858f123296f19648b23577ff7e5212746d7d7b79a95f75708916f49aeea6f0ff038fd639f7c03be61ea3b1dd686", @nested={0x1e4, 0x31, [@generic="17860a41362522a6763b5a662886641f7d6d8526e1d45bf97b1079dfc2aeaa1b1233380017d8a91ab29f60d3e53b88974fe762229365168fd8c8115b120db61a6a0331f88b3b418d9a25a36026f9ab468e7c7b158238d61e5db552be8aaad9b62bfc36fa8df933a1e1f97078d4d3703ca41d72ef0b4716e405eabeeae4554d2555579353a12a8ae878b465fa6a6e96aa4980f8947477ccb7394e355edd0a85eefa12da3b83456a8bf41340c0b1", @typed={0x8, 0x2d, @u32=0x6}, @typed={0x2c, 0x25, @binary="84af34a0cb2e8c284e3c00851ae4e56fe42ecadfc33bc2bcdf46dd757c23b5ba732b13e1a8"}, @typed={0xc, 0x8b, @str='em0^.\x00'}, @generic="76327b24efc56130985a642f793d5f0db1b16da0003ee0fa1c33de17f62f2a8ecb91e90ac44079e13242532e38544aade119751554ee731ee4a2fede9c24ad", @generic="f0c17cacf7367caccc6d3e3dcdc4f515043bc25a92467c09a26646b58aa27ecbaea8b410375e1a6a3354a254c696b81adce07d124db5bc810f3d75be3cbc00b7d203b99cf26c235fba042ce8a4bbe83defd32085489122449821979cf9ddfc6028266895c2d8f2b3f389574732aad5ef32ee0dcd3e1c863a11193bc3b2dec0fcd53ebba606198cfc852bbe3f5a362b9aa0220330b3cde63c", @typed={0x14, 0x87, @ipv6=@ipv4={[], [], @remote}}, @typed={0x8, 0x2b, @pid=r4}]}, @generic="016eb9f250bcef57da3dabf6fd129c47f9445f7e5633a9ad8fb39136db9959ca0ba95e9d418609a290c96f574485408b5d0edc5151d4a269a0a55938d1e9c4b29ddd22c4599d1917d8b5d0f2327fcede1cb523c241d4e4c9da5a03212ee39432d7ae7463f06a6b505fa2eae1f765f976288c2889e59cfadb288776bfe1792c9d6c55b92d6fb06bb93cb4624dd64d0b69715f0923524cd880e45fcbaaa8878e62ecfdb724e54882629233477ff4d7b1c1133619d4d0fc59157ae5f2409c8e1eaf2984e540664cb6e8a366e2a1ae582a58830846", @generic="c5e69328a0fb533fe153187e6069e41ea34f051d6e9e4a7730bca4531c9cb476693a1a6ebf493c6b9f3aff7b8239b8e1a94b3cf76b76b5c13b8d1fc1e669bfc82e57714fc24b7e9b6643c378e2a3a3dae3de4d5ae11d5f2ad6594f268d440c26b4d3825405321424cc1d00d931910cc400b64a49ef4dca465e0062b1d25632dd66b2ab0809bbc9de6bb20f5ecf6239734f08b9a0bc33ba8848c3ac140d8114a1d80b519e82e4fe2a43116c57b7b655778605a0680157f224cd5bd5c0a0670e8925800e", @generic="31794bea05960d9d1feb3c99fc905702265554fba029cb7c19fb4dbe25edc68dfbfd7a1808c9c1bc539baa02ca8b1d515a07c272517e4a7bf981289766b5b3975d306867cd4245030b8195c9a02f1b0c1eb2f9e67f01231b51220e766f8b65ffc18e0f5153404df998149e90a2b031973bef5e299246ae2c0ea8149758093588fc"]}, 0x694}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) getpriority(0x0, r4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:30 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4, 0x3}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000000)="dd0bef7ff517ef23546402"}, 0xf) 18:41:30 executing program 4: 18:41:30 executing program 1: r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff}) 18:41:30 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:30 executing program 7: 18:41:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x6}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) r1 = semget$private(0x0, 0x1, 0x84) semctl$SEM_INFO(r1, 0x0, 0x13, &(0x7f0000000000)=""/73) 18:41:30 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:31 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000001380)}, 0x10) 18:41:31 executing program 1: r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff}) 18:41:31 executing program 7: 18:41:31 executing program 4: 18:41:31 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:41:31 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:31 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x100, 0x4f, 0x4, 0x8, r0, 0x7fff}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) 18:41:31 executing program 1: 18:41:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:31 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000140)="7831a616329403f0"}, 0xfffffffffffffd5e) 18:41:31 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:31 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:31 executing program 1: 18:41:31 executing program 7: 18:41:31 executing program 4: 18:41:31 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400103, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000040)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:31 executing program 1: 18:41:31 executing program 7: 18:41:32 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x280240, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r1, 0x50, &(0x7f0000000040)}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) 18:41:32 executing program 4: 18:41:32 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x20000, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x90000012}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r2, 0x209, 0x70bd27, 0x25dfdbfc, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x8}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x200000d1}, 0x488c0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000000)="f8e026abfaa1d240c1d66b05f884679f28584e7104b517f400b285e6ba872ba9158cbbe7"}, 0x10) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x402400, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000080), 0x4) 18:41:32 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:32 executing program 7: 18:41:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x40000000000010) recvmmsg(r0, &(0x7f0000000100)=[{{&(0x7f0000000500)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000640)=""/71, 0x47}}], 0x1, 0x0, &(0x7f0000001b80)) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000017000)=[{&(0x7f0000004000)="240000001d0003ffff3cc0023da2830101eee6cd7986c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) [ 482.403403] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 482.471544] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 18:41:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:32 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000003340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) llistxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000480)=""/222, 0xde) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=@known='com.apple.system.Security\x00', &(0x7f00000001c0)='user_id', 0x7, 0x0) read$FUSE(r0, &(0x7f0000000580), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f00000000c0)={0x10, 0x0, 0x3}, 0x10) 18:41:32 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0xc, 0x2, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) 18:41:32 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x280, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x9, 0x200) linkat(r1, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00', 0x1000) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) ioctl$UI_END_FF_ERASE(r2, 0x400c55cb, &(0x7f00000001c0)={0x0, 0x3, 0x1}) ioctl$VHOST_RESET_OWNER(r2, 0xaf02, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f0000000180)={0x2000}) 18:41:32 executing program 7: unshare(0x200) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000), &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000003c0)) mount(&(0x7f0000000300)=@loop={'/dev/loop'}, &(0x7f0000000240)='./file0\x00', &(0x7f00000001c0)="18765468f7c38d", 0x100004, &(0x7f0000000400)) setns(r0, 0x0) getresgid(&(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000100), &(0x7f0000000040), &(0x7f0000000180)) 18:41:32 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:32 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="92"], 0x1) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7f}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x7f}) 18:41:32 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) [ 482.865432] IPVS: ftp: loaded support on port[0] = 21 18:41:32 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4, 0x101000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x12000200}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x6c, r2, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6}, @IPVS_DEST_ATTR_U_THRESH={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7f}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x48}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x40040c0}, 0x80) 18:41:32 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000300)="dd876225527bcd37913c4973b0ccf5e7099a42df73c0a7e12b8449e53501d63ad4b0b13cd717c5ddee5e66b34a23d3b8d8c6ca924051e606bcc32e7c5fa10accac20000000000000007204a0f1a35d5c7699b820aea156cf822a0836f36ff23021f2279a90a544d9baf908dcd771d0185588592adc011bc2aaf223aebf4e350fa598db65772e1d5a2062d5475d30f773f515dbd4c6b881395ed51d3a5226f310470e99b0b59e7d849cfa853eea977d09e57819f7e254e08d05d0c3a65661a9f493e4d670f8674ec49ec5aaafb5e19fba9bcfa3a8761d", &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:32 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40000, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000080)={0x2}, 0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000040)={0x0, 'bond0\x00'}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) 18:41:33 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x210, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x288) 18:41:33 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x20180, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r1, r2}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r3, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r3}, 0xffffffffffffff80) personality(0x400000b) 18:41:33 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x8, 0x12, 0xffffffffffffffe0, 0x6f, 0x28, r0, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) fcntl$lock(r0, 0x7, &(0x7f0000000040)={0x1, 0x7, 0x3, 0x40, r1}) [ 483.221913] xt_connbytes: cannot load conntrack support for proto=7 [ 483.228616] xt_connbytes: Forcing CT accounting to be enabled [ 483.284499] xt_connbytes: cannot load conntrack support for proto=7 18:41:33 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000300), &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:33 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x210, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x288) 18:41:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) [ 483.732089] xt_connbytes: cannot load conntrack support for proto=7 18:41:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={"6c6f00ecff00000000000000f9ff00", 0x0}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000240), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=@ipv6_newaddr={0x2c, 0x14, 0x503, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x14, 0x2, @loopback}]}, 0x2c}}, 0x0) 18:41:33 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x24, r1, 0x21, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe950}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffffffffffc}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004040}, 0x4000010) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x1) 18:41:33 executing program 7: unshare(0x200) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000), &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000003c0)) mount(&(0x7f0000000300)=@loop={'/dev/loop'}, &(0x7f0000000240)='./file0\x00', &(0x7f00000001c0)="18765468f7c38d", 0x100004, &(0x7f0000000400)) setns(r0, 0x0) getresgid(&(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000100), &(0x7f0000000040), &(0x7f0000000180)) 18:41:33 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x787c30f735f1c234, 0x4, 0xc, 0x2, 0xb, r0, 0x6}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x7ff, 0x80000) fstat(r2, &(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000012c0)={{{@in, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f00000013c0)=0xe8) fstat(r0, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001480)={0x0, 0x0}, &(0x7f00000014c0)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001500)={0x0, 0x0, 0x0}, &(0x7f0000001540)=0xc) fstat(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() getgroups(0x2, &(0x7f0000001600)=[0xee01, 0xffffffffffffffff]) getgroups(0x4, &(0x7f0000001640)=[0x0, 0x0, 0x0, 0xee01]) fsetxattr$system_posix_acl(r1, &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000001680)={{}, {0x1, 0x2}, [{0x2, 0x4, r3}, {0x2, 0x7, r4}, {0x2, 0x2, r5}, {0x2, 0x1, r6}], {}, [{0x8, 0x0, r7}, {0x8, 0x5, r8}, {0x8, 0x6, r9}, {0x8, 0x7, r10}, {0x8, 0x4, r11}], {0x10, 0x6}, {0x20, 0x4}}, 0x6c, 0x2) ioctl$VT_RELDISP(r2, 0x5605) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000001cc0)=""/4096) write$binfmt_aout(r2, &(0x7f0000001700)={{0xcc, 0x3f, 0x6, 0x53, 0x15b, 0x7, 0x333, 0x7fff}, "e70e610b48ad0bcd2db54ab5f408fd6f6ef571cb19961d0aa53fe7c64c942c6284bdee5abfa35f1f3b8b3d85270a33399f4196250a7602fa1d3a79dd90485842390dac91f31f785113061d6cc7dc457496e0e66010a237f6bb5b8e73e1be3eb70291c056061bf20103edc0d314380c8d", [[], [], [], [], []]}, 0x590) r12 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x40002, 0x0) ioctl$KDDELIO(r12, 0x4b35, 0x6) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000180)) 18:41:33 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000300), &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:33 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x210, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x288) [ 484.124935] IPVS: ftp: loaded support on port[0] = 21 18:41:34 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x400000) openat$cgroup_int(r1, &(0x7f0000000040)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) 18:41:34 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r0, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r1, 0xadcd, 0x8}, 0xc) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) [ 484.160729] xt_connbytes: cannot load conntrack support for proto=7 18:41:34 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000300), &(0x7f0000000400)="3be50744f187a04759442e970f3df93c7c4e88bfd717af26ea555d31499e66d05b52f6790f8d2b8ebbb84a996c0c7d9f72bace50fda1fbfd358622a75617e6a176abaac4895aa7c00f8b0aa24c9d8d133ed3202ccb3c1c53cd9212fd2ef532523ac0315acd1c31b1fc6bf6514c02a30f5cc26fe39ab76d30a989ecf6884c9d94c91871b09ef8261055c4", 0xfffffffffffffffd}, 0x20) 18:41:34 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='io.stat\x00', 0x26e1, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$FS_IOC_FSSETXATTR(r0, 0xc0185879, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x105}) 18:41:34 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x210, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x288) 18:41:34 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = accept$unix(0xffffffffffffff9c, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e) ioctl$sock_ifreq(r1, 0x891a, &(0x7f0000000140)={'veth0\x00', @ifru_settings={0x7, 0x10001, @cisco=&(0x7f0000000100)={0x0, 0x8}}}) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180), 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) [ 484.651553] xt_connbytes: cannot load conntrack support for proto=7 18:41:34 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x8080, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:34 executing program 1: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x210, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x288) 18:41:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:34 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:34 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000300), &(0x7f0000000400), 0xfffffffffffffffd}, 0x20) 18:41:35 executing program 7: unshare(0x200) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000), &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000003c0)) mount(&(0x7f0000000300)=@loop={'/dev/loop'}, &(0x7f0000000240)='./file0\x00', &(0x7f00000001c0)="18765468f7c38d", 0x100004, &(0x7f0000000400)) setns(r0, 0x0) getresgid(&(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000100), &(0x7f0000000040), &(0x7f0000000180)) 18:41:35 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x787c30f735f1c234, 0x4, 0xc, 0x2, 0xb, r0, 0x6}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x7ff, 0x80000) fstat(r2, &(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000012c0)={{{@in, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f00000013c0)=0xe8) fstat(r0, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001480)={0x0, 0x0}, &(0x7f00000014c0)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001500)={0x0, 0x0, 0x0}, &(0x7f0000001540)=0xc) fstat(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() getgroups(0x2, &(0x7f0000001600)=[0xee01, 0xffffffffffffffff]) getgroups(0x4, &(0x7f0000001640)=[0x0, 0x0, 0x0, 0xee01]) fsetxattr$system_posix_acl(r1, &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000001680)={{}, {0x1, 0x2}, [{0x2, 0x4, r3}, {0x2, 0x7, r4}, {0x2, 0x2, r5}, {0x2, 0x1, r6}], {}, [{0x8, 0x0, r7}, {0x8, 0x5, r8}, {0x8, 0x6, r9}, {0x8, 0x7, r10}, {0x8, 0x4, r11}], {0x10, 0x6}, {0x20, 0x4}}, 0x6c, 0x2) ioctl$VT_RELDISP(r2, 0x5605) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000001cc0)=""/4096) write$binfmt_aout(r2, &(0x7f0000001700)={{0xcc, 0x3f, 0x6, 0x53, 0x15b, 0x7, 0x333, 0x7fff}, "e70e610b48ad0bcd2db54ab5f408fd6f6ef571cb19961d0aa53fe7c64c942c6284bdee5abfa35f1f3b8b3d85270a33399f4196250a7602fa1d3a79dd90485842390dac91f31f785113061d6cc7dc457496e0e66010a237f6bb5b8e73e1be3eb70291c056061bf20103edc0d314380c8d", [[], [], [], [], []]}, 0x590) r12 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x40002, 0x0) ioctl$KDDELIO(r12, 0x4b35, 0x6) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000180)) 18:41:35 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x805, 0x9, 0x7, 0x7f}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) 18:41:35 executing program 1: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x210, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x288) 18:41:35 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000100)={'veth1_to_bridge\x00', {0x2, 0x4e21, @loopback}}) r2 = getpgrp(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=0x0) kcmp(r2, r3, 0x1, r0, r0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x24a00, 0x0) ioctl$GIO_FONTX(r4, 0x4b6b, &(0x7f0000000040)=""/51) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) 18:41:35 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000300), &(0x7f0000000400)}, 0x20) 18:41:35 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f0000000340)="7e0e3ab44929d690f0e3870c67035a8a69a621af4fd1677d60e751da458070c86c0f56eb80ba155d50490ef592ccbe616474f62c50d7f214e0d46392f618c5d5313318056d0d198848c5f03e1f1028100a03c67f3501c38ff7947cb0ec09d01273ad2d080c6b947d1d02cba15836b6566656e15fbc38579a4d2c1b25f91f94449ba3d42cc7beb792873a260a5f942145b3b8f140ab3cb18ccc9d1f2e08b9d049c22533c6b400e745ca36f353a7907782c0e9625142a7ffd97a983ad84bb468d1a141327218964e640a72ca59fbcc0618e28ccad8b03b158425880e091a21c485b374db9878000ba2f68f5badd168fda0"}, 0xffffffffffffff8c) 18:41:35 executing program 1: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x210, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x288) 18:41:35 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000040)={0x0, 0xcfe, 0x0, 0x8, 0x4}, &(0x7f0000000080)=0x18) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000100)={r1, 0x8}, 0x8) [ 485.611632] IPVS: ftp: loaded support on port[0] = 21 18:41:35 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x24, r1, 0x21, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe950}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffffffffffc}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004040}, 0x4000010) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x1) 18:41:35 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x15a) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x9, 0x10401) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000040)=0x3ff0000000000000) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:35 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000300), &(0x7f0000000400)}, 0x20) 18:41:35 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:36 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x210, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x288) 18:41:36 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0}, 0xc) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40e082, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r1, 0x0, 0x0, 0x2, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) 18:41:36 executing program 7: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x20180, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r1, r2}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r3, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r3}, 0xffffffffffffff80) personality(0x400000b) 18:41:36 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x24, r1, 0x21, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe950}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffffffffffc}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004040}, 0x4000010) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x1) 18:41:36 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x305000, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x7) 18:41:36 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x210, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x288) 18:41:36 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000300), &(0x7f0000000400)}, 0x20) 18:41:36 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0x9, 0x7, 0x4, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r2, &(0x7f0000001380)}, 0x10) 18:41:36 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x210, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x288) 18:41:36 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000380), &(0x7f00000003c0)=0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) r2 = msgget$private(0x0, 0x20) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000040)=""/120) 18:41:36 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x24, r1, 0x21, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe950}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffffffffffc}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004040}, 0x4000010) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x1) 18:41:36 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x200000, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000080)={'yam0\x00', 0x7f}) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) 18:41:36 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0x7, 0x4d, 0x1}, 0x7) 18:41:37 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 18:41:37 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10}, 0x10) 18:41:37 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x210, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x288) 18:41:37 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4, 0x3, 0xffffffffffffff9c, 0x5}, 0x13f) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x44002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:37 executing program 5: socket$bt_bnep(0x1f, 0x3, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x6, 0x7, 0x4, 0x0, 0xffffffffffffffff, 0x40000000}, 0xfffffffffffffead) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) 18:41:37 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x1) [ 487.355983] kernel msg: ebtables bug: please report to author: bad policy 18:41:37 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cfe9c65120b091f412cdfd9f58bbafce550defc2c31e83f371b14d08ba72813330edd39173dffaa6bd0267b46bc8f38c49d52dbb0d07ddbc4b5c016e4a95b75eb98d0b33c7850dbe0c87933590495fec9e3902dd3879ecea9e79a0159c36d918cdbf118175873e2f90d01fea197273784421f664482b3b6a674023a398bc9f54ae2d2d4d"}, 0x10) 18:41:37 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) pread64(r0, &(0x7f0000000100)=""/62, 0x3e, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) 18:41:37 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x210, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x288) 18:41:37 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 18:41:37 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x853, r1, 0x0) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4, 0x8000000000000000}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r2, &(0x7f0000000000)="0893f60337e3a544d39f1404ca8d959e69564f50afe15b97df76e433bb5d9b57f7df11dc8aff39c71331944c15ae6aa4477c502a9b05cf03feda5a2837eafd5614eaf254e0d0b175cd936b833cfced4588eb8a6cf7"}, 0x10) [ 487.718109] kernel msg: ebtables bug: please report to author: bad policy 18:41:37 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x1) 18:41:37 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$TIOCSTI(r0, 0x5412, 0x7) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000040)={{0xffffffffffffffff, 0x2, 0x8, 0x3, 0x3}, 0x1, 0xe41}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r2, &(0x7f0000001380)}, 0x10) 18:41:37 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cfe9c65120b091f412cdfd9f58bbafce550defc2c31e83f371b14d08ba72813330edd39173dffaa6bd0267b46bc8f38c49d52dbb0d07ddbc4b5c016e4a95b75eb98d0b33c7850dbe0c87933590495fec9e3902dd3879ecea9e79a0159c36d918cdbf118175873e2f90d01fea197273784421f664482b3b6a674023a398bc9f54ae2d2d4d"}, 0x10) 18:41:37 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x210, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0x0, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x288) [ 488.123002] kernel msg: ebtables bug: please report to author: bad policy 18:41:38 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x8000000000005, 0x9, 0x7, 0x4}, 0x5e) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:38 executing program 4: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={0xffffffffffffffff, &(0x7f0000000180)="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"}, 0x1) 18:41:38 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:38 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10}, 0x10) 18:41:38 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1a8) 18:41:38 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) r1 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xe, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x69d9e3f8, 0x0, 0x0, 0x0, 0x1}, [@alu={0x4, 0x7, 0xb, 0xe, 0x8, 0x42, 0xfffffffffffffff4}]}, &(0x7f0000000100)='syzkaller\x00', 0xffffffff, 0x9, &(0x7f0000000140)=""/9, 0x41000, 0x1, [], r2, 0xf}, 0x48) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, 0x0, 0x0) 18:41:38 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cfe9c65120b091f412cdfd9f58bbafce550defc2c31e83f371b14d08ba72813330edd39173dffaa6bd0267b46bc8f38c49d52dbb0d07ddbc4b5c016e4a95b75eb98d0b33c7850dbe0c87933590495fec9e3902dd3879ecea9e79a0159c36d918cdbf118175873e2f90d01fea197273784421f664482b3b6a674023a398bc9f54ae2d2d4d"}, 0x10) 18:41:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x12) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x6, 0x2000001, 0x7, 0x2000000000000004}, 0x2c) r2 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x1, 0x1) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x9}, &(0x7f0000000240)=0x8) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f00000002c0)=0x769071074554590f, 0x4) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000280)={r3, 0x5}, 0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, &(0x7f0000000080)="1f043a850688f93e6af004d129ed785d6bf8120cac55f2dd22a46b962eab123c33d3200f5c76b05ab5"}, 0x10) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) [ 488.530108] kernel msg: ebtables bug: please report to author: Total nentries is wrong 18:41:38 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1a8) 18:41:38 executing program 4: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={0xffffffffffffffff, &(0x7f0000000180)="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"}, 0x1) [ 489.026204] kernel msg: ebtables bug: please report to author: Total nentries is wrong 18:41:39 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 18:41:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000180)}, 0x10) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400000, 0x0) flistxattr(r1, &(0x7f0000000240)=""/4096, 0x1000) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1c, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x0}, &(0x7f0000000080)=0x14) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000100)={@multicast2, @remote, r2}, 0xc) 18:41:39 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = shmget(0x2, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000100)=""/207) r2 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x8, 0x866dca016f15f8fb) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000240)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f00000002c0)={0xa, 0x4, 0xfa00, {r3}}, 0xc) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f0000000040)="760d27c37bede23242283700687843b83701cb1ac4e4144569fa837bbe17bd8a04f8a03ad93c0180000000170000a5df11aa0b800a7e0eec54f3de8a8e324da4d6be2398e404e51f5fce01db17dca01dcec9ad77bf78489b5d1f13ba2060040a5ed178cf600a27b97b1e96589eb32b2c"}, 0x10) 18:41:39 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cfe9c65120b091f412cdfd9f58bbafce550defc2c31e83f371b14d08ba72813330edd39173dffaa6bd0267b46bc8f38c49d52dbb0d07ddbc4b5c016e4a95b75eb98d0b33c7850dbe0c87933590495fec9e3902dd3879ecea9e79a0159c36d918cdbf118175873e2f90d01fea197273784421f664482b3b6a674023a398bc9f54ae2d2d4d"}, 0x10) 18:41:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1a8) 18:41:39 executing program 4: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={0xffffffffffffffff, &(0x7f0000000180)="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"}, 0x1) 18:41:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000280)="67f7ffc3cbd6506ca7b24b1165f03511ebc51c21ffffffffc8eb5fd56df1387e115a0d63736642398bc04777d3b3b2d830117a749e3d9adce5bdc3f7809baa4010e89363300f2ca158a96b"}, 0x10) 18:41:39 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x200, 0x4}, 0x2c) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$P9_RLERROR(r1, &(0x7f00000001c0)={0x1e, 0x7, 0x1, {0x15, '/proc/self/net/pfkey\x00'}}, 0x1e) bind$unix(r1, &(0x7f0000000140)=@abs={0x1, 0x0, 0x4e21}, 0x6e) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000300)="1f86a88f118a1a7921adb7e2be50c9e343c261bbf04dbe26cbecc8871a45104dd5c2e640f3b4aa36c7dd8d473bdb20ba43a73111d7dfb796760880923147fbecf5b62b1108be639b7a0f99d51efcc1cab39a4b58950900202684699a98237443d27e687d0d665af2b5278d630976e3a6da81361f76680288d4f9fef48ee38427473d7ce4abb2a4c0c8cc9453263d92a8f62f00faeea086cccb28433a202aad0db13963b14c3de5687d8d423755a52dc1cc599aab531064b31eaa2dcafc26fd89c19022839b3e6e82301d2c5cbce5db6ea7c3245e7f34b8445e8dfddfa2ff4228e9a6188b14a5ce4ed93a3f8e53b2f20f838d526111de9da27c4f265cc2bd81c3d8d4ee308cb7e752d44d66d0aeb35d26ce34901ae102c3544329922e5ded075354032d500c11af44e3c6809319db9aeaa083b7d5098fd790336857b51e4f5bb7089367ed1f9a03b849d9464cde74096510b95f10b659272b8455e169f82d9bfd4e9dfed6ab1a861fbe0a03df88d1ee2afba8f03067567f456a70601924503a9dec41b12340a777ba7df175a70000000000000000000000"}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000000)="0e3df3c79873ae88bcafe3069adebe2cf6dd64ce185be2da608738f7bcf602a6532bb731254e135a3db0cd041a7f5db0bed52da2d0e47c14991061e7859a304041dd89418f282d1745394d63af0da02a8c4158f7a60448919f4a620a0b963e71e92c602746f9cf7015b1"}, 0x10) [ 489.373368] kernel msg: ebtables bug: please report to author: Total nentries is wrong 18:41:39 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10}, 0x10) 18:41:39 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cfe9c65120b091f412cdfd9f58bbafce550defc2c31e83f371b14d08ba72813330edd39173dffaa6bd0267b46bc8f38c49d52dbb0d07ddbc4b5c016e4a95b75eb98d0b33c7850dbe0c87933590495fec9e3902dd3879ecea9e79a0159c36d918cdbf118175873e2f90d01fea197273784421f664482b3b6a674023a398bc9f54ae2d2d4d"}, 0x10) 18:41:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x210, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x0, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x288) 18:41:39 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x1) 18:41:39 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x4000, 0x0) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000140)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000000)="34fcece4af4d5548e49e67abbed2aa0a2fdb997c76f5de6a8e31e0965c25f6cee8e6d2444a16190fcebcf63d0f6b29bf4f042f346e1280d4a178cca505e2776fe16097a5f20898bcb0702b989616c2b8cbc7cca9accfdd2414f30c70277946025de38e90b281e2e163ac0546de00431496"}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) 18:41:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x1, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x48, r2, 0x110, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x10001}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x18f2}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x4040001) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) [ 489.816048] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 18:41:40 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cfe9c65120b091f412cdfd9f58bbafce550defc2c31e83f371b14d08ba72813330edd39173dffaa6bd0267b46bc8f38c49d52dbb0d07ddbc4b5c016e4a95b75eb98d0b33c7850dbe0c87933590495fec9e3902dd3879ecea9e79a0159c36d918cdbf118175873e2f90d01fea197273784421f664482b3b6a674023a398bc9f54ae2d2d4d"}, 0x10) 18:41:40 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 18:41:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x210, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x0, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x288) 18:41:40 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x6, 0x1ff, 0xb, 0x0, 0xffffffffffffffff, 0x3}, 0x15c) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x604840, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000140)}}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000040)=0xffffffffffffffff, &(0x7f0000000080)=0x4) 18:41:40 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x1) 18:41:40 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) keyctl$set_reqkey_keyring(0xe, 0x2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:40 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000240)="2f3b806a53cfe9c65120b091f412cdfd9f58bbafce550defc2c31e83f371b14d08ba72813330edd39173dffaa6bd0267b46bc8f38c49d52dbb0d07ddbc4b5c016e4a95b75eb98d0b33c7850dbe0c87933590495fec9e3902dd3879ecea9e79a0159c36d918cdbf118175873e2f90d01fea197273784421f664482b3b6a674023a398bc9f54ae2d2d4d"}, 0x10) [ 490.458122] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 18:41:40 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:41:40 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000100)={0x10000002}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000040)=""/99) 18:41:40 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:40 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x1) 18:41:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x210, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x0, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x288) 18:41:40 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x10002, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 18:41:40 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000240)="2f3b806a53cfe9c65120b091f412cdfd9f58bbafce550defc2c31e83f371b14d08ba72813330edd39173dffaa6bd0267b46bc8f38c49d52dbb0d07ddbc4b5c016e4a95b75eb98d0b33c7850dbe0c87933590495fec9e3902dd3879ecea9e79a0159c36d918cdbf118175873e2f90d01fea197273784421f664482b3b6a674023a398bc9f54ae2d2d4d"}, 0x10) [ 490.992471] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 18:41:41 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x200, 0x0) write$P9_RLOCK(r0, &(0x7f0000000040)={0x8, 0x35, 0x7, 0x5}, 0x1e1) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r1, &(0x7f0000001380)}, 0x10) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000340)={'team_slave_1\x00', 0xfffffffffffffffe}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000280)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xc, 0xb, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000300000000000000060000000201000007000000000000000000000055ff0600fcffffff0000000000000000df75fcff0100000000000000000000001800000002000000000000000800000095000000000000004b1658ff535fb7c00282089c16b2b93a98b0e4e1863e44eb5673a18231382a01bd8e7e6d73ecdfd34d65eafe64921e963a081b513412390e933fca7922000000000000000000000000000000"], &(0x7f0000000380)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x1, [], r2, 0x6}, 0xffffff1b) 18:41:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) socketpair(0x13, 0x80003, 0x8e5, &(0x7f0000000040)) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000000)='./file0\x00', r1, r2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:41 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x0, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x1) 18:41:41 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x10002, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 18:41:41 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) 18:41:41 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000240)="2f3b806a53cfe9c65120b091f412cdfd9f58bbafce550defc2c31e83f371b14d08ba72813330edd39173dffaa6bd0267b46bc8f38c49d52dbb0d07ddbc4b5c016e4a95b75eb98d0b33c7850dbe0c87933590495fec9e3902dd3879ecea9e79a0159c36d918cdbf118175873e2f90d01fea197273784421f664482b3b6a674023a398bc9f54ae2d2d4d"}, 0x10) 18:41:41 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2000, 0x0) ioctl$UI_SET_PHYS(r1, 0x4008556c, &(0x7f0000000040)='syz0\x00') socket$inet6_sctp(0xa, 0x5, 0x84) 18:41:41 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x0, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x1) 18:41:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7935, 0x10000) write$UHID_DESTROY(r1, &(0x7f0000000040), 0x4) 18:41:41 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) 18:41:41 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cfe9c65120b091f412cdfd9f58bbafce550defc2c31e83f371b14d08ba72813330edd39173dffaa6bd0267b46bc8f38c49d52dbb0d07ddbc4b5c016e4a95b75eb98d0b33c7850dbe0c87933590495fec9e3902dd3879ecea9e79a0159c36d918cdbf118175873e2f90d01fea197273784421f664482b3b6a674023a398bc9f54ae2d2d4d"}, 0x10) 18:41:41 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:42 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x0, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x1) 18:41:42 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xf, 0x4000000400000007, 0xfffffffffffffff9, 0x4}, 0x2c) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000040)=0x7, 0x4) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f00000001c0)=0x80, 0x80800) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000080), &(0x7f0000000100)=0x4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) [ 492.096975] kernel msg: ebtables bug: please report to author: bad policy 18:41:42 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x10002, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 18:41:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="d0ce0b91f246b012a607951c2cd0aef5f2a66922324e4da5755b4f06f17eb4fcedf4c37632997c9cec6ef8ae0a2b1974f6ccc81cd87f9a7d97350f4e7c3f1f1b000203c07bb227123bde85f7001dc5ecc8535471d69c912ecff9cd9cb7a60b94b72aa71d7bf3cdbd6544a2d754d1c8743c6b2a876c71ba3e30da80345cbf80f91607e152287e9be7bdbcceaca9b9c9078e6c71efb0fb28fd2ec8e8d0bc88d3270505bdcd7554a2f863d0749bc2e49443eeb6ceb986650261ea37fb53274cbe", &(0x7f0000000180)}, 0x20) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$BLKRAGET(r1, 0x1263, &(0x7f0000000000)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000080)}, 0x1) 18:41:42 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cfe9c65120b091f412cdfd9f58bbafce550defc2c31e83f371b14d08ba72813330edd39173dffaa6bd0267b46bc8f38c49d52dbb0d07ddbc4b5c016e4a95b75eb98d0b33c7850dbe0c87933590495fec9e3902dd3879ecea9e79a0159c36d918cdbf118175873e2f90d01fea197273784421f664482b3b6a674023a398bc9f54ae2d2d4d"}, 0x10) 18:41:42 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) 18:41:42 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x0, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x1) [ 492.590045] kernel msg: ebtables bug: please report to author: bad policy 18:41:42 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x10002, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 18:41:42 executing program 5: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000001c0)=0x1c, 0x80000) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000380)={0x2, 0x5, 0x80}, 0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/172) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000280)="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") pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00') r1 = getpid() mknod(&(0x7f0000000000)='./file0\x00', 0x8000, 0x5) ioprio_set$pid(0x1, r1, 0xc18) 18:41:42 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x30d040) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x1, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f0000000080)}, 0x10) 18:41:42 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cfe9c65120b091f412cdfd9f58bbafce550defc2c31e83f371b14d08ba72813330edd39173dffaa6bd0267b46bc8f38c49d52dbb0d07ddbc4b5c016e4a95b75eb98d0b33c7850dbe0c87933590495fec9e3902dd3879ecea9e79a0159c36d918cdbf118175873e2f90d01fea197273784421f664482b3b6a674023a398bc9f54ae2d2d4d"}, 0x10) 18:41:42 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x0, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x1) 18:41:42 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) [ 492.989453] kernel msg: ebtables bug: please report to author: bad policy 18:41:43 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:43 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x110) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) getgroups(0x3, &(0x7f0000000080)=[0xee01, 0xee01, 0xffffffffffffffff]) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3], 0x9e) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r5 = socket$vsock_dgram(0x28, 0x2, 0x0) unshare(0x20400) connect$inet(r5, &(0x7f0000001680)={0x2, 0x0, @broadcast}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r4, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r4, &(0x7f0000000080)}, 0x10) 18:41:43 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x0, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="18aa240800000013de00eeca720000000000000001ced27debeb05a800006d7e63f7694dac3b7e0cbb7d33eebc8adbcdc1f6e5fc2adbbb6cb4cd89e847692f4a0c6b12f9cc0609b79f802bb1da75210384a93ec3ac06815b9ca37ad7e0f3aa4ae67aa7bb2ef4f7febb0c0c595fe2d9ca7550bd6c4ece2276b5ef9d78376c0a6b7bd3eef376293d9604273668c374511e5b7106ab7ee98168ee5d724d7021380dbc6fc410e7ad88a4ec96278e92871059ca166d3652c4d5fd5d93a2ddbacd015513b366d973a8c3f0581788bfe702201a63d851d6e762bee30f09bdba7eb381aad4ee53dec67cf5564e2fe6e500fb4b5fa406b0af25819920439554f4cfc95ae71d1992b94f54a7e2f039cc3f08a6cd1dfef6469cd4c5414c95e461a650c4e9bdb8da78bd79893c7cc63f83fc986f0af98e477bbe6ac4e1337d414e13674e803e849abf438342f1a0d9c1d28cd135e6fc5f4bf8d825e799b0ab59a2b8cf76da9b17abd301980976c9498ab9f816b60b92b8889a7a8307d37877bd7b15b4104edb78e826951eaefe4a3d8fb02f1c198c7db9f7a182e35e18cc82ac9f2cf092b8463ff8bf1e683032e520b2bd8d1684a0be2cde0c4e21e33a75058be3d23ac8205433535078bf7e7d3139367f6967145386c179f8e92e7847210512ef2eae4cd56d34b7866d42749f1e0892902db200d54786c81ade2b11bfe7e2fb7e9e1b9ffb0af1ea61f786f82d2104dc55c22eea28829570645959cdee44c860c467aa6f0de5dc178af8cca80f7beeb185130327476fe6589fd684c76870ae768c38ab2cc6e172757e6d4f87b5f95196566e06a4e1bc9218a83486047cf258f1cbe3b975885e3d37b98f3cf74c468005626f1bf1945c085e5a355620a4548916adba564ae80f11f5e401ce7764ef5006d5cebc20dbd0adcb2009126370f78a729cadb80ea633b7541ba4e66247d0c3720195e60b3662bc"}, 0x1) 18:41:43 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, 0xfffffffffffffffe, 0x0) 18:41:43 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x0, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cfe9c65120b091f412cdfd9f58bbafce550defc2c31e83f371b14d08ba72813330edd39173dffaa6bd0267b46bc8f38c49d52dbb0d07ddbc4b5c016e4a95b75eb98d0b33c7850dbe0c87933590495fec9e3902dd3879ecea9e79a0159c36d918cdbf118175873e2f90d01fea197273784421f664482b3b6a674023a398bc9f54ae2d2d4d"}, 0x10) 18:41:43 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x10002, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 18:41:43 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) 18:41:43 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x1) [ 493.537418] kernel msg: ebtables bug: please report to author: bad policy 18:41:43 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0x2000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000240)="5a47ed3e0942431d9d652da895ec2f581b0bfcdaef136e4593914f32dbbbd4b464cab477ec2ffedfc7ce033cc989f3c76bab7b0760bbaedeac1265727ff9f9b7afabddb9e8879219e517264c0e73e868a90677d723c67aac07755cfc58858c9a9ec0730591dd537e04ded3e57bad2000929d038a4935d2416bbb4985099757a6f8ba2271a7a2", &(0x7f0000000300)="1a4cb61eb8dee7e93e3c743db95e8daaf462dc7c7d6bc84052cff0f4220753b18308775b51a1893ecb869bfffdd9f23a1230c126d4130cd62eb9305c755c3c91e8ed899fab9aa36d041379b44e017b6ee2e5880ab72e3b1cc25052609b5e3bced93c1a19fa835b6f0f72d2cee318e78e45cdda65525ad699033864b055a13257a474f607c09dba88d0ead1804691539680f3797073834412", 0x1}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000040)="000109ec2fe7c772db3393ddae7bf32106d910be6542a9638b1121cd0b4d4e5c8f4ead48a9999f738e4a05ddb01809407f37db605bdd3e62802c19f6512310391d5465adaa55489136a33f8f8c9b51c37e08666cb5830f4b", &(0x7f0000000100)="15a40d1dff97c0e88448eb"}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f00000001c0), &(0x7f00000003c0)="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"}, 0x15c) bpf$MAP_CREATE(0x0, &(0x7f0000000540)={0xf, 0x2, 0x7, 0x7, 0x4, r0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f0000000080)}, 0x10) socket$inet6_udplite(0xa, 0x2, 0x88) 18:41:43 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2001, 0x0) listen(r0, 0x9) listen(r0, 0x8000) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r1, &(0x7f0000001380)}, 0x10) 18:41:44 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x10002, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0xfff, 0x3a9}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 18:41:44 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) 18:41:44 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x0, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cfe9c65120b091f412cdfd9f58bbafce550defc2c31e83f371b14d08ba72813330edd39173dffaa6bd0267b46bc8f38c49d52dbb0d07ddbc4b5c016e4a95b75eb98d0b33c7850dbe0c87933590495fec9e3902dd3879ecea9e79a0159c36d918cdbf118175873e2f90d01fea197273784421f664482b3b6a674023a398bc9f54ae2d2d4d"}, 0x10) 18:41:44 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x1) 18:41:44 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x2000) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000080)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x400000, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x4005, 0xc, 0x5, 0x4, 0x0, r1, 0x4000000}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r2, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r2, &(0x7f0000000080)}, 0x10) 18:41:44 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:44 executing program 5: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x800, 0x80000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bcsf0\x00', 0x0}) sendmsg(r0, &(0x7f0000000780)={&(0x7f0000000140)=@hci={0x1f, r1, 0x3}, 0x80, &(0x7f0000000640)=[{&(0x7f00000001c0)="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", 0xfd}, {&(0x7f00000002c0)="c25adca9ca908069c4215eff889ef9e9e866250bf0364e927dab2e8a4c95f3eac7b7cbfc46483ed771c821f5decd2d14b469fee117784348574e0ef527c4c1ea50674bd4f178941f9dd27abc94f8950ca7bbc13f9ddea1612d94492e16d3515666f14b6a10a259f5ab91422e383c8ba0fadc1f136b2ba0eba62976e40d4b819a9c2b11ee65", 0x85}, {&(0x7f0000000380)="6cc0f1436fdde785e1fd8bc7c83675f0ead585d93ae9b204124ebcc9e386f4c20fe547f45e95e84a355b79dd2194e723143b77d0c6a020460f0165ece36adf9a72e6b2268357827f0224c806ca92a7f3273202ee83a7a21b1dc1717178e3f9d48adcc06fee271f37d150dcd6ccaa18f5c7518268f80dbc7c573a0a7c6db98fa72f3bd3ab916cd27376a461546c19021b113df12a08e9e3dfe4c50520d96dbe8918101461637174c731c1acbdcbc0e58267b9a90e4e4ed45652f0e54e020a6064a99fb89537af", 0xc6}, {&(0x7f0000000480)="12fd06a7b475f0d2d1e9552ef0f5c2aafa270f4d735b4d4d06edcffa6f8e97bc788bce52bb40ee69daf5a7aa2a723664dc0276d281ed63285493f3c8d176b0fa7ea4a5", 0x43}, {&(0x7f0000000500)="cd3e9df08cba015c5d5f0b1e47311ae7ed51280e50563eca00d2e85e8a24fa18e4cd9567e8e209f63ed13c081afa1ea99ccb40c7ded5ad0a5f525b6e1a36fb07d190cebfcb6a2946092331c0cbbab0108b7951a1", 0x54}, {&(0x7f0000000580)}, {&(0x7f00000005c0)="4ba006f46455066b98158d13322c0e91f128e8d02b2c72bc3e6e9e1e9347c69d69306b3d6d06448dbf51c186169f831f8d225d7820ee80a05f04df93d3969cf855426b6aa0fbc9a54379", 0x4a}], 0x7, &(0x7f00000006c0)=[{0x88, 0x10b, 0xffff, "d638e4bc85810ad31b48c8874f1ca91c08456035fe241fbbc796271e391131d072f428d9de28d00517469b06d8f97b913965ee59554f8774d1169192b1b78acfd375d73f269f63be19ee16ca44b1374abbb88abbc6174552951ee33ff19fb85a8485500d0419214abb26d37c15829a562524a7"}], 0x88, 0x40084}, 0x4000000) open$dir(&(0x7f0000000040)='./file0\x00', 0x80, 0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0xc, 0x3, 0x7, 0x200, r0, 0x3}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r2, &(0x7f0000001380)}, 0x10) [ 494.349429] kernel msg: ebtables bug: please report to author: bad policy 18:41:44 executing program 2: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_pts(0xffffffffffffff9c, 0x400) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x10400, 0x0) ioctl$BLKRRPART(r3, 0x125f, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r5 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x28a100, 0x0) r6 = openat$md(0xffffffffffffff9c, &(0x7f0000000180)='/dev/md0\x00', 0x0, 0x0) poll(&(0x7f00000001c0)=[{r0, 0x100}, {r2, 0x20}, {r3, 0x3}, {r4, 0x4000}, {r5, 0x100}, {r6, 0x400}], 0x6, 0x1) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4, 0x0, r3}, 0x2c) ioctl$UI_END_FF_ERASE(r2, 0x400c55cb, &(0x7f0000000340)={0x1}) ioctl$BLKPBSZGET(r5, 0x127b, &(0x7f0000000240)) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f0000000280)={0x28, 0x2, 0x0, {0x4, 0x0, 0x9}}, 0x28) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, &(0x7f00000003c0), 0x4) r8 = getpgrp(0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000380)=r8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r7, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) splice(r7, &(0x7f00000002c0), r0, &(0x7f0000000300), 0x4, 0x6) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r7, &(0x7f0000000080)}, 0x10) 18:41:44 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x1) 18:41:44 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) 18:41:44 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x0, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cfe9c65120b091f412cdfd9f58bbafce550defc2c31e83f371b14d08ba72813330edd39173dffaa6bd0267b46bc8f38c49d52dbb0d07ddbc4b5c016e4a95b75eb98d0b33c7850dbe0c87933590495fec9e3902dd3879ecea9e79a0159c36d918cdbf118175873e2f90d01fea197273784421f664482b3b6a674023a398bc9f54ae2d2d4d"}, 0x10) 18:41:44 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x110) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) getgroups(0x3, &(0x7f0000000080)=[0xee01, 0xee01, 0xffffffffffffffff]) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3], 0x9e) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r5 = socket$vsock_dgram(0x28, 0x2, 0x0) unshare(0x20400) connect$inet(r5, &(0x7f0000001680)={0x2, 0x0, @broadcast}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r4, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r4, &(0x7f0000000080)}, 0x10) 18:41:44 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x8005, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) [ 494.733086] kernel msg: ebtables bug: please report to author: bad policy 18:41:44 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x1a8) 18:41:44 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={0xffffffffffffffff, &(0x7f0000000180)="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"}, 0x1) 18:41:45 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000180)) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f0000000240)=""/236) r3 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x3, 0x444580) renameat2(r2, &(0x7f0000000040)='./file0\x00', r3, &(0x7f0000000100)='./file0\x00', 0x2) 18:41:45 executing program 7: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x110) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) getgroups(0x3, &(0x7f0000000080)=[0xee01, 0xee01, 0xffffffffffffffff]) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="9e0000007d010000007000070000f0ffff820402000005000000000000000000000007000000090000003d0700000000000030005e26736d696d655f74776c616e3029656d30706f7369785f61636c5f6163636573734c736563757269747925400a0040776c616e307d2d655d0300255e2c000019006c6f478e0000006d305b3a6d696d655f74797065656d3030251120498de8fb9548f2daa7704863f5a4546136a7e0f144d0870f54083c4e38a2e2222d82efdc94e4a586ab0f12e3a3d2a82c3b439cc1afcb6ea71b8dcecd15ca6f7afc77b5c885eea1be8cca87d48eb1eede99e7fd7293d9d99626e0412e57c824de7424efd217a47531d440b01caea39fad4124fc85e7bc2073849b9d8d53e974d9434206159b29fde0ef3a9b95979fbea74f24c54100", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3], 0x9e) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r5 = socket$vsock_dgram(0x28, 0x2, 0x0) unshare(0x20400) connect$inet(r5, &(0x7f0000001680)={0x2, 0x0, @broadcast}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r4, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r4, &(0x7f0000000080)}, 0x10) 18:41:45 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x9, 0x7, 0x4}, 0x12) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7, 0x2000) ioctl$TIOCNXCL(r1, 0x540d) 18:41:45 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x0, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cfe9c65120b091f412cdfd9f58bbafce550defc2c31e83f371b14d08ba72813330edd39173dffaa6bd0267b46bc8f38c49d52dbb0d07ddbc4b5c016e4a95b75eb98d0b33c7850dbe0c87933590495fec9e3902dd3879ecea9e79a0159c36d918cdbf118175873e2f90d01fea197273784421f664482b3b6a674023a398bc9f54ae2d2d4d"}, 0x10) 18:41:45 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x110) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) getgroups(0x3, &(0x7f0000000080)=[0xee01, 0xee01, 0xffffffffffffffff]) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3], 0x9e) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r5 = socket$vsock_dgram(0x28, 0x2, 0x0) unshare(0x20400) connect$inet(r5, &(0x7f0000001680)={0x2, 0x0, @broadcast}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r4, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r4, &(0x7f0000000080)}, 0x10) 18:41:45 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x1a8) 18:41:45 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x244081, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x4}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={r1, 0x5}, &(0x7f0000000180)=0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r2, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r2, &(0x7f0000000080)}, 0x10) 18:41:45 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={0xffffffffffffffff, &(0x7f0000000180)="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"}, 0x1) [ 495.132085] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 18:41:45 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x110) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) getgroups(0x3, &(0x7f0000000080)=[0xee01, 0xee01, 0xffffffffffffffff]) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3], 0x9e) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r5 = socket$vsock_dgram(0x28, 0x2, 0x0) unshare(0x20400) connect$inet(r5, &(0x7f0000001680)={0x2, 0x0, @broadcast}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r4, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r4, &(0x7f0000000080)}, 0x10) 18:41:45 executing program 2: r0 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000040)=0x1c, 0x80800) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f0000000080)}, 0x10) 18:41:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x1a8) 18:41:45 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x0, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cfe9c65120b091f412cdfd9f58bbafce550defc2c31e83f371b14d08ba72813330edd39173dffaa6bd0267b46bc8f38c49d52dbb0d07ddbc4b5c016e4a95b75eb98d0b33c7850dbe0c87933590495fec9e3902dd3879ecea9e79a0159c36d918cdbf118175873e2f90d01fea197273784421f664482b3b6a674023a398bc9f54ae2d2d4d"}, 0x10) 18:41:45 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3ff, 0x0) ioctl$KDDELIO(r1, 0x4b35, 0xfff) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) write$P9_RLERROR(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="e71d0ee0170000000702000e002f6465762f61646d6d69"], 0x17) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000140)) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000080)={0x2, 0x401}) 18:41:45 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={0xffffffffffffffff, &(0x7f0000000180)="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"}, 0x1) 18:41:45 executing program 7: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x110) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) getgroups(0x3, &(0x7f0000000080)=[0xee01, 0xee01, 0xffffffffffffffff]) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3], 0x9e) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r5 = socket$vsock_dgram(0x28, 0x2, 0x0) unshare(0x20400) connect$inet(r5, &(0x7f0000001680)={0x2, 0x0, @broadcast}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r4, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r4, &(0x7f0000000080)}, 0x10) [ 495.485448] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 18:41:46 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x7, 0x91, 0x7e9, 0x7, r0, 0x2}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f0000000240)="1f885f89409d3869d3289571018cff5c2717c40558b8e2fd15b1e1f10efdbbd185688d49faf5d3e8617496b20197a3a1b9c0efbd575d83389e0062c469de4c3e1736524eca4bb7badddf6b0eb3254143353438ae1716a4aebc5d7d05c4583e459c0d7419b7764fef1c2645c032670a4a2b8066a9ba4cb0eb3744202a767227e5693f9ef38d789ea3850147819e65311e7ee6b8cede3483cef523f76bd031e21de8c546a98f8e5f89716103f8f48521b2aa8fe411e53a0c6868d01b492c887de55f0aa9958f570508d37aa99dbe7346cd60cad1906fe8c3d8af2d97d9736b0dcb31505e8bce711c76dbae8890f86a3407"}, 0x10) 18:41:46 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)}, 0x10) 18:41:46 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) 18:41:46 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x110) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) getgroups(0x3, &(0x7f0000000080)=[0xee01, 0xee01, 0xffffffffffffffff]) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3], 0x9e) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r5 = socket$vsock_dgram(0x28, 0x2, 0x0) unshare(0x20400) connect$inet(r5, &(0x7f0000001680)={0x2, 0x0, @broadcast}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r4, &(0x7f0000000080)}, 0x10) 18:41:46 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x0, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cfe9c65120b091f412cdfd9f58bbafce550defc2c31e83f371b14d08ba72813330edd39173dffaa6bd0267b46bc8f38c49d52dbb0d07ddbc4b5c016e4a95b75eb98d0b33c7850dbe0c87933590495fec9e3902dd3879ecea9e79a0159c36d918cdbf118175873e2f90d01fea197273784421f664482b3b6a674023a398bc9f54ae2d2d4d"}, 0x10) [ 495.872373] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 496.229468] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 18:41:46 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:46 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) restart_syscall() 18:41:46 executing program 7: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x110) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) getgroups(0x3, &(0x7f0000000080)=[0xee01, 0xee01, 0xffffffffffffffff]) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3], 0x9e) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r5 = socket$vsock_dgram(0x28, 0x2, 0x0) unshare(0x20400) connect$inet(r5, &(0x7f0000001680)={0x2, 0x0, @broadcast}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r4, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r4, &(0x7f0000000080)}, 0x10) 18:41:46 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)}, 0x10) 18:41:46 executing program 2: r0 = getegid() getgroups(0x1, &(0x7f0000000000)=[0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setresgid(r0, r1, r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r3, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) io_setup(0x3, &(0x7f0000000100)=0x0) r5 = dup3(r3, r3, 0x80000) io_cancel(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x6, 0x7, r3, &(0x7f0000000240)="95701f050b876d47d507f523e983d233597138590dcea103d9d7e75eca6bf9eb2d30937802ed2eeec762e31decc10edc8c6215f28f584be6dfe850afc99bf993912f0d96d5d05232344ecf344e3a60f281b096594be9a4d88640a313f496749445fbd06b6147ab2a14c70a76aa7e4fe97ffe732978732655a9ebd9523babfae8f225f52e8061", 0x86, 0x4, 0x0, 0x1, r5}, &(0x7f00000001c0)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r3, &(0x7f0000000080)}, 0x10) 18:41:46 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x110) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) getgroups(0x3, &(0x7f0000000080)=[0xee01, 0xee01, 0xffffffffffffffff]) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3], 0x9e) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) socket$vsock_dgram(0x28, 0x2, 0x0) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r4, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r4, &(0x7f0000000080)}, 0x10) 18:41:46 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cfe9c65120b091f412cdfd9f58bbafce550defc2c31e83f371b14d08ba72813330edd39173dffaa6bd0267b46bc8f38c49d52dbb0d07ddbc4b5c016e4a95b75eb98d0b33c7850dbe0c87933590495fec9e3902dd3879ecea9e79a0159c36d918cdbf118175873e2f90d01fea197273784421f664482b3b6a674023a398bc9f54ae2d2d4d"}, 0x10) 18:41:46 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0xfffffffffffffeee) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x4, 0x80000) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0x7}, 0x4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000001380)}, 0x10) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000080)={0x0, @speck128}) 18:41:46 executing program 7: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x110) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) getgroups(0x3, &(0x7f0000000080)=[0xee01, 0xee01, 0xffffffffffffffff]) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3], 0x9e) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r5 = socket$vsock_dgram(0x28, 0x2, 0x0) unshare(0x20400) connect$inet(r5, &(0x7f0000001680)={0x2, 0x0, @broadcast}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r4, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:41:46 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) [ 496.876817] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 18:41:46 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) socket$netlink(0x10, 0x3, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:47 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)}, 0x10) 18:41:47 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x110) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) getgroups(0x3, &(0x7f0000000080)=[0xee01, 0xee01, 0xffffffffffffffff]) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3], 0x9e) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) socket$vsock_dgram(0x28, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r4, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r4, &(0x7f0000000080)}, 0x10) 18:41:47 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x1a8) 18:41:47 executing program 7: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x110) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) getgroups(0x3, &(0x7f0000000080)=[0xee01, 0xee01, 0xffffffffffffffff]) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3], 0x9e) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) socket$vsock_dgram(0x28, 0x2, 0x0) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r4, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:41:47 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) [ 497.255905] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt [ 497.268326] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 18:41:47 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:47 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cfe9c65120b091f412cdfd9f58bbafce550defc2c31e83f371b14d08ba72813330edd39173dffaa6bd0267b46bc8f38c49d52dbb0d07ddbc4b5c016e4a95b75eb98d0b33c7850dbe0c87933590495fec9e3902dd3879ecea9e79a0159c36d918cdbf118175873e2f90d01fea197273784421f664482b3b6a674023a398bc9f54ae2d2d4d"}, 0x10) 18:41:47 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)="7978f480363f9866e1582ab754158620e9f8b1b7", &(0x7f0000000180)="5d32f3df06a3df2500ffffffed0000000180000000652504fbc5a92995b2b9d2c84835e426d2068c25c8aee1d1a62a14de6b14d9f3e9e1dd87098dc68b3c922316c8000000000000000000000000000000"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:47 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x110) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) getgroups(0x3, &(0x7f0000000080)=[0xee01, 0xee01, 0xffffffffffffffff]) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3], 0x9e) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) socket$vsock_dgram(0x28, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r4, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r4, &(0x7f0000000080)}, 0x10) 18:41:47 executing program 7: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x110) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) getgroups(0x3, &(0x7f0000000080)=[0xee01, 0xee01, 0xffffffffffffffff]) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3], 0x9e) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) socket$vsock_dgram(0x28, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r4, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:41:47 executing program 5 (fault-call:5 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:47 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x10) 18:41:47 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) [ 497.660020] FAULT_INJECTION: forcing a failure. [ 497.660020] name failslab, interval 1, probability 0, space 0, times 0 [ 497.671654] CPU: 0 PID: 22568 Comm: syz-executor5 Not tainted 4.19.0-rc1+ #42 [ 497.678991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 497.688403] Call Trace: [ 497.691168] dump_stack+0x14b/0x190 [ 497.694872] should_fail+0xa98/0xaa0 [ 497.698671] __should_failslab+0x278/0x2a0 [ 497.703133] should_failslab+0x29/0x70 [ 497.707125] kmem_cache_alloc+0x127/0xb20 [ 497.711392] ? kmsan_set_origin_inline+0x6b/0x120 [ 497.716390] ? getname_flags+0x127/0xaa0 [ 497.720552] ? __msan_poison_alloca+0x173/0x1f0 [ 497.725383] getname_flags+0x127/0xaa0 [ 497.729458] ? do_mkdirat+0x66/0x670 [ 497.733233] ? __se_sys_mkdirat+0x92/0xb0 [ 497.737613] do_mkdirat+0xaa/0x670 [ 497.741306] __se_sys_mkdirat+0x92/0xb0 [ 497.745367] __x64_sys_mkdirat+0x4a/0x70 [ 497.749499] do_syscall_64+0xb8/0x100 [ 497.753383] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 497.758633] RIP: 0033:0x457099 [ 497.762044] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 497.781210] RSP: 002b:00007fad91a17c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 497.789144] RAX: ffffffffffffffda RBX: 00007fad91a186d4 RCX: 0000000000457099 [ 497.796592] RDX: 0000000000000000 RSI: 0000000020000500 RDI: ffffffffffffff9c 18:41:47 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cfe9c65120b091f412cdfd9f58bbafce550defc2c31e83f371b14d08ba72813330edd39173dffaa6bd0267b46bc8f38c49d52dbb0d07ddbc4b5c016e4a95b75eb98d0b33c7850dbe0c87933590495fec9e3902dd3879ecea9e79a0159c36d918cdbf118175873e2f90d01fea197273784421f664482b3b6a674023a398bc9f54ae2d2d4d"}, 0x10) 18:41:47 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000380)="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"}, 0xd) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7f, 0x84002) pipe2(&(0x7f0000001f00), 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000001740)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001780)={{{@in=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in6=@ipv4}}, &(0x7f0000001880)=0xe8) getgroups(0x5, &(0x7f00000018c0)=[0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0xffffffffffffffff]) r5 = gettid() r6 = geteuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001900)={0x0, 0x0, 0x0}, &(0x7f0000001940)=0xc) r8 = gettid() getresuid(&(0x7f0000001980)=0x0, &(0x7f00000019c0), &(0x7f0000001a00)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) r11 = fcntl$getown(r1, 0x9) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001ac0)={{{@in6=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000001bc0)=0xe8) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r14 = gettid() fstat(r0, &(0x7f0000001cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) r16 = getgid() sendmmsg$unix(r1, &(0x7f0000001ec0)=[{&(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000016c0)=[{&(0x7f00000002c0)="249bdd77b61d8c9ba9b7f2dc9fe95cfecc03729d561aa1a8dcd6d9e655b881f02c2f8d03fad61a2add336161d652315097202ae545b90f817bc622c9baf3746e2ac2ec7f6fdba9abe23c8be6f435e9498afadff5f6a4f0d61a2660be1e4da29802a6ba8c046505aadfa5e14a00474d6b255e118127f9b9c511e3d7a916a0912cdf44b393df35f5d1d6c119504059b4fc2e734fa9886ec0394752b7aefba64a4399413eb94b33f6c5e17cecf3c83c64", 0xaf}, {&(0x7f00000004c0)="b1fb7ddad8653d8ba9e02f4b765e1a0660510703d69f327a277fb03f38b1a51e6c977554477ee7883f52f64573491c6d9e0d0a07724d4201f78ef4e2447a3d7c8fdbd872076ad6b13c8670256c56922155519952de503bc709a4a94e915d0e2928585f2dfca965f289739313776094a95ec8910c09d5afa10dead83fa4affe36a78659ffc965ddbda022df634e00f1411564eb67fc6fd91599924d037db7d91057ade2615065dce2097a8f92aadf5d1767c32a124a5126dfaed764659e1b492cf6b6ee164beffd59160e775519c46c75f112bee12b4b03b4ccc4915f03a6378d0e6428acad1d83c9", 0xe8}, {&(0x7f00000005c0)="02da2214992d617547c051bcc00362eaf5672a531bc373807a18bd766eb225e65d4bb9df931968a0077290a6aa8ca10d777d13239fad8e3e2df214d2bdce07bbb7ed75c1b540faff8330b72b5e64fca388279e4bfbb81ed1965ea630", 0x5c}, {&(0x7f0000000640)="818abdbd8370fc3311efd2eb666f783db0ba8367828b9599f89dcfd4e9b0a4ea708031c99d301250c789ea93d13fde2d5fee4530f3746e0ad767c055e87514dcc1bff31fea8c77b71df0b527c78d8e526c5d39a60c84c91040d1ae48951cc9d24e76b2a252b6880dca6efdfa1ccfbfa864ec9176e2d0b4bddeccba272800c60490e655cb4ad730f18d094029225fbbec61a8a5b1e4975a37ccce63a711257e86b705ce2e69240c7d3fd25790590eb0c0a1464b641cf48e2305661ddb781d7f22b08c8e69d10da7c8d88525f86258b8b36c33c87118f11440615acd84747e54a2419fa45d57d6338cc433ffc8d5eb0d0f606fb31ce8105fc868bfbd7809e20d5fa2edcbc0e089b40352c85b3f231d25c7c2e5b7fda5356c790eea5510760f50a78827189e6ee2dc9c9ccf3c014f112f542aa832d6e70ac787a50f07d21b1192d572d337619e918178114ab50357df0409be0539309b79675029245a8cd90314fe77d8b4ccc861d663631f22ea109fc07320e0d3c1cc7a0fe83bc71763eda64252bcdb4c2620409846c9e7a16ac835ea9f4335955302f25d89f1576f1de7c2819a4fafa997f2fafb469ec83e3cbcaab7cc8a34bca73ec1d2eedf9037347262883f534b25a97c84b7b93650b744bb26f5e3874fa7d896c8c496de2475225178672f0886f834e60903d3218da5d0394042e6014446dcea663a5c3971518292a2586a123b92c8b51571d41029117a390d45f7550a181edca3fc357d6a85d2add5430b240e9f9691be9e0c81817bfcba02b05d1e063a3c3e1b711bca8ee40fbf1e18eb0c181df38c2804c60bd5c632317f0d355d9971825c56b0530f6ff1e535566685947bc2bda197ad793ffc0fc1fc5141c4b8fb4036575dfbcf0032f40b9bb48a30f352aa71f2decbd771265ae8a2cbd4a240010c3f9a8e4a70ad8a3d8adfdd11ab5e37547fdf79a97a79a67e36ab7515edf88856b51cbc0b3c174d11d358867d06423dd70f5ec7ce9c5cdc8a5404310aed2be4c2087a31429685f177e044822b86c9dc1af2afc6b952a01f4d98810c64c8d8ae37ddcc4141cfa28435b7f5b7c7faebd072b000f7e37a2e9101aa904263fab05ea0aebc4438773b2d058997b830f684e373e92c846bd5bba262e72a6689af3fed7fb787a5fe00674e05f07a0fa5f2fdc264921271a8364fc957bafacd2d795bbf340504ebf06d86c84ed0153edfb023295a520c1159021b6aaf14035a1d296a4b7967f30d11bb64950c86d04cf8c9ecd199ae1934fa979f3c33431ccb09b5d92628917bb96670e678f976f935a146757863aad11c065cbb628e9469e3e7cfb19868eff947cad39fd433573ac0738cc6ac541e17f21f6e5b3937217319f99ee715ffa38a6daf0a63743f77fa4683c6c8780be24912780c7d275b40152f216ebb5f301ce40d4faaa90f3d345b02a7b47881452ad7c787df98e0c0f161ad84522fa877b171d2e5c30a66c5730d1982b646d6071d3274fd6fc7f272c0af8d9bb7452bbb09b1f01b4af930c5b35f91969136382266c18a79208e0c1f3f31bdf5a737439e4ff84dcee2a7a04be95c533740b4ed88ea1b75c00197984287dd5a3635ba3b4737f50846d76da13c5dea466642370ae20a269119923ce091c78980aa16d0270ed8ca8b4fc426834cf36135b615cef719b4ba80807146adab2af6076afee0e7fbc000826f16ccac48c3ead0687b4a73560987a6c10ad0af952fa87b842c8707e3ac7b13c21fa04f45d2d5fe4aedf09187f18155442031be5de243cee8c4c8d4b8a57094832596bab13a1d26db7fa60fde10968e87c9512746e9a970f09f3cce3761e6e2049f2da9b41978deb4c68f06b8d578406f429f94bacaa41806ae9b08de814f750a83603ed2b642db136594601d6bd06b42bb6947c847c0c45a6e406d15eea8025a1ba5c3c314f7f8b7e177a9f49f46dcc7fd73a94bdc2cbf4de79e559b442f54edfb2f9d21da3f0d50ba192e2473bb61de017acf8867c473f6a52fb7c269af259281e142d00cd62e73a7d934ba214a73c19e8e7e3d47c08fae11d503fd1e9fabee073a957dc069d5b78d273b3907d15a858b807cc14c1e08f9d3c7c4db49169962259fdc35667ba14571fe21b6fce076aa615cd493629ddeb32313182302abe7c62b992a345717e4155e3c2c7e89c277f03e88254f1b1e05f68c180effd8576061279d847f80a91dfcb74c91ed4e5405515fd964ca2832717c9cdc8ea94243284bd3b7de0bb41028dfcf26a6ea2794c78188aabb7fe8e66449cfc4c57c01781f16eccaa67c234a6778d2f08598edb52fe2f2fc66b525c27b4be689ee5b65722c9fd263391d58f5ae7693bda573ceb92dc3b4eda15ed168dbc595e6d538d664d6acd8324083e8f85a052cde511d83f42945208d008201c9cbd5aaeb7783b36e1855683fda689a9af7cf63ff5ded18935fac869f7d1c5b1b9f0b72c96f722f101831f22cbdd9ac92844a30dea9ce02db302c9f0531a3bfe726b716990cfa80872f3bd1e5a8c7f59754f3811a2dcdde832b590dd945552a5e81e2f64537ec7e0b328dbcead1e93aeb868141006f17877e186b32d633b428fc2e4a84bf303d69611724f1af1e379f267c5e6c2e63802b9887497c9114c04f83f9eda8a3de4c5bbc17ed18435cf69c0fc1e4f0dea3d5139000e86714118f26943b07b4a027e77ecfbacf0f9bb07f2d047742dbec42c4d4a6e16f3f661d03c271fc5c119c9c27c244c3b023f3c058a1ac7c415af603400841a792151ffb8744ac53c9459af33fc5864f44ebe3511579fa81ac4d54df17ca903615c8128ab69459e8df6db99ba21c6c815bdb23c0585c696c5a24a0ede32e90ee1aacc2b5259e20882a79e8a0137e276db10de2d63d79ee5acd914a532d44f448cec94f23ef88844665c984184b6d89723394a25606bf00160f0a317e3fbed991bd0e38ac1d0743e45a4805dbb82e20e13e0a0e0c9930c9419f48a6752c1ddf0c7981c64280d47ed9a0728552662b125fb3e2a7c56bd833985729d422680ed3ac55763d937814a2054dfcfede7b2d74f22886ec9391384390f254468e763c842019a87366d8b19e80131e6a968407fcf1b5261e72d213ea50cb83b887c3bb8ac54c5bdf72a93e05f64b051f7205b92857935dbc9c1fd1ac2425b9cb32e0f5f5684141519977d8f44567363baf4589f6300878012fe3ac43cf7c9d132c6a5b4a2f35497c8192c0382e0240f9d9c448053cc64dec459d1df925b508ca062407a76d8e3f0e64d70745c404b909ce069c5d49b10da3b8bd8a8054a964267230dfcc35f8d211bfb1215f0b88d879a3ad4fd70a83eacc1258af8c8d1539f2d3dd945e4c80443bb1cc805681583855a0f6b44d1ade5f298d371828725bbb9f5230ea576c6c8c28fcf0c95a168f9c61c0a173406069404726ce639b23474d6b1665fa46df24febaa0bc8e668d15b18483f7d854a812c8c7ab06ff2efded4182eac11d8f456d463adec1550dd7f86f6105e280d377dd8fb8d50fb8ffe9e62aa8f58695ba10bfa86e4cc2b30db3d8c6e1b3b1b0afc577ddf1d0c67b4f37205478ff83eb6b656f6f9605f154a89fe118393aeeae1ffa532909d4223e3d7989f8443ae106ef9752e648748a4970c26b4ffc0accaa56ec58729123ddd288f1115898209996d37212c398594c17725fc263ffc88f9c6028101c936a1b1a8db93029c65dd23e3df1b745a0f1b17838b707fed9055205021059631a792bbadb2412a28c82e5eafd1ce42e821915bc5f8e3be0d3ebbfb95c8a000ee32ebcf1e06920c01ba17e7a04fe6fa2ec642e1148f66c4c29244585db85ea320b53d185d006d6bc27b1a1d6e5cd29d80b487f84d8ce707393e815d47c4228140ca6b7f4ee6501cc91c913b62c29ed1a2330eab1bd4de6e5082422fb87e297ab3b0085054400081f5457f035d1c86deb44ca8265fc62558bebfd0680dc208c8de16819dba573229aa0fdf679736b56329cb2132734887fa86b49f30a5d83f50f826746366d967c3781dcffc113982da90b08fcd218f0274d08dea990c7dbeb14f27b058fe7eefdd58f6924d9cc96718d9d252a54498ff929028ba5d77b043ea38b3d0eaa9eedc0d204fe0df972904f68c7f281707edfdd1b71921f4234af2a87e63fa3951008f3625303ca8cee555d12cd95501bfd68429a64c9f0558588e93bb54414ba9e5e2f5e2007b9a3d15cc926e4d7d42707283f2b5c1d66eff0c32c53664260a8f734890fc6c3d36d40e8cf5011fd70110b7d02638d323d541696693541f19386d5049b51fc6d1e69dbabe1514cf88eec9359b18ca24b2f44dde39134964ac9b063eaa4d875ac1a95c64a67c66ca2be26b39de2849f837dcaf050fb0e08ac6b13111bb2289ef1dfae1a1d2b635b441b53ea465c5dea338cae878b761f7ad1834b093945a04c8cc915f5364a8219e3cfae2fc80736107e1843d41fbf7b62c06468cdd2883d63e491956fcdea871715877f6c093cbcdcd0a864e6cb02e08ca5c509629038763b0b29f2b44672c2e1335616f5d36cf32be2a02ab4ff72f17ce9afddd42d9109f836072d473cce8a2c66bd4d71a65c0964720cbbb42bbfe4a00f92af4b1acacbae4108630bd5f1af6c7cffbf3733155dfa857d30f841f7b27fcdee507a2c3d1d040cad42538538569a6f02dc7c4151c57641f2faeec5deeda51e7e5ef26915d93e4421141207bc9d7d16cfa27fd35d38c08b8197d8ef5f746d2397ad8bb56a744db339aaf3de6b1e3ef35e2860f701ba4cc1ed6791b2c96763e04a5f53f265b0b4db685d77f576baeafc3680ae5fc4309d530ca63582c42cea32bf74225262a73407f78baf2a525c2e75e899f04c7bf38757eeef1964dd6cef5e4cf516e840be98dc92bbfc13740de88877ddfa8add4054e59bf0cea05b653ee7c33d05f2a9fb5d4fbc6cc0258c1016a73df96dcd5793949d0d823286e05ac83b105b3a31786007726c7f4b039387d62180118f29353c5ecd843d12365cd8ee10120fc82b956860c5126b855553c547cfe8ebb8bdc6a2e7f46232cb3dc1ed9aaf2aa13aaba072cc2fe5c456b7ebc2c579458586319572f7a43312d83f5b22e0ddbfc6d709e323fc94f8c180a73f7071dd34a22a8d19f8a78b084f405d14ad0fd279332dfc48fd286b2ac8137303165ff2ccddb9057f08fce41f4641092a0d05b4ad9a6a523739ddb8e9d3f09d4930cfa959731205d6022bb1d1e8dcaa395b089988f9b4a37519e46706090c45c738b10ab1363b72462bf2258b19467333efdf6cd381173f2a2acd1efa9127182274490d95f2060d29ba797593908c80a1eed07a0f0bccf50bba7825337c501c0ef86f4fbb7d6477ee5430afd6524a4ee41f2c9c2be2a1c79f714787bf388485f83e0b452707e3341ec14a01f0c76af846cfaef7adbd184ac6bed8ee22a96f99c7ed5457fc9c4797b505e5d9eb99ef169b8bd25729919f51fc43b4ff073fe7c9eec89fdf9df7faec66dea979c4f002785abf3e5f2dafce68ab1d0454cd5bd578b3ae1c12aff6757fc1bf3f1b65188df160a934dd50bf47cfdebd4c1df9324efea7a724d4562d6dc88bf8c55e50c1c24f11b6546756e5287d7924b5645bc5c647c9784e66c2e9f0b55dc1dad2ce97bbd5ad2b19fb690428a123fa065a83020ebd2d1dec16ec81e0db6fc87ddac43013eb450da70982b84569b55dc1700143bbdeddcf64b914ff5747e8931266144ce02d89fd56bb44d166a5368630c26bd366bf5ccda7a479256c7e08f357e2788dd9dfeb3626ce832cfa8c307c", 0x1000}, {&(0x7f0000001640)="b1edf7085d76ecf01a8b6fde5a5ce67154304ff3902865b337cec0f7bc775159369d829d72ac5268b8bad58e5a10393c1a7544a2ddd8b1ef66229054c7a3bce54a46563da18e274be66c950a92126787989997664e5e47b4eaa216f18def24dfbbd079b425237a63d7f1dd42d5", 0x6d}, {&(0x7f00000001c0)="d171a9218785e39b2e3751ec878cbd20d06902c08293890a8173417520b0bdb49c22dbf5d94bc899efe539b3862c059a", 0x30}], 0x6, &(0x7f0000001d40)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x20, 0x1, 0x1, [r1, r1, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @rights={0x38, 0x1, 0x1, [r0, r0, r1, r0, r0, r1, r0, r0, r0, r1]}, @rights={0x18, 0x1, 0x1, [r1]}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @rights={0x38, 0x1, 0x1, [r0, r0, r1, r0, r0, r1, r1, r1, r1]}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @cred={0x20, 0x1, 0x2, r14, r15, r16}], 0x148, 0x4004001}], 0x1, 0x81) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0xf3a5}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x5, 0x8005, 0x101, 0x1ff, r17}, &(0x7f0000000180)=0x10) [ 497.803938] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 497.811323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 497.818673] R13: 00000000004d3090 R14: 00000000004c8107 R15: 0000000000000000 18:41:47 executing program 1 (fault-call:1 fault-nth:0): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) 18:41:47 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x110) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) getgroups(0x3, &(0x7f0000000080)=[0xee01, 0xee01, 0xffffffffffffffff]) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3], 0x9e) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) socket$vsock_dgram(0x28, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r4, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r4, &(0x7f0000000080)}, 0x10) 18:41:48 executing program 7: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x110) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) getgroups(0x3, &(0x7f0000000080)=[0xee01, 0xee01, 0xffffffffffffffff]) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3], 0x9e) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) socket$vsock_dgram(0x28, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r4, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) [ 498.012565] FAULT_INJECTION: forcing a failure. [ 498.012565] name failslab, interval 1, probability 0, space 0, times 0 [ 498.024215] CPU: 1 PID: 22585 Comm: syz-executor1 Not tainted 4.19.0-rc1+ #42 [ 498.031588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 498.041021] Call Trace: [ 498.043808] dump_stack+0x14b/0x190 [ 498.047508] should_fail+0xa98/0xaa0 [ 498.051341] __should_failslab+0x278/0x2a0 [ 498.055714] should_failslab+0x29/0x70 [ 498.059712] __kmalloc_node+0x22a/0x11c0 [ 498.063852] ? __msan_poison_alloca+0x173/0x1f0 [ 498.068624] ? __get_vm_area_node+0x27b/0x800 [ 498.073200] ? ima_file_check+0x124/0x150 [ 498.077436] __get_vm_area_node+0x27b/0x800 [ 498.081893] __vmalloc_node_range+0x32e/0x1140 [ 498.086601] ? do_replace+0x359/0x780 [ 498.090495] vmalloc+0xd8/0xf0 [ 498.093893] ? do_replace+0x359/0x780 [ 498.097890] do_replace+0x359/0x780 [ 498.101640] do_ebt_set_ctl+0x2a7/0x3b0 [ 498.105723] ? try_module_get+0x52/0x3c0 [ 498.109910] ? nf_setsockopt+0x16f/0x4e0 [ 498.114055] ? ebt_cleanup_entry+0xae0/0xae0 [ 498.118707] nf_setsockopt+0x47c/0x4e0 [ 498.122723] ip_setsockopt+0x344/0x3b0 [ 498.126736] udp_setsockopt+0x108/0x1b0 [ 498.130837] ? udp_lib_setsockopt+0xb60/0xb60 [ 498.135579] sock_common_setsockopt+0x13b/0x170 [ 498.140463] ? sock_common_recvmsg+0x270/0x270 [ 498.145177] __sys_setsockopt+0x496/0x540 [ 498.149546] __se_sys_setsockopt+0xdd/0x100 [ 498.153952] __x64_sys_setsockopt+0x62/0x80 [ 498.158477] do_syscall_64+0xb8/0x100 [ 498.162379] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 498.167635] RIP: 0033:0x457099 [ 498.170899] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 498.189870] RSP: 002b:00007f551014fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 498.197664] RAX: ffffffffffffffda RBX: 00007f55101506d4 RCX: 0000000000457099 [ 498.205007] RDX: 0000000000000080 RSI: 0000000000000000 RDI: 0000000000000003 18:41:48 executing program 7: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x110) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) getgroups(0x3, &(0x7f0000000080)=[0xee01, 0xee01, 0xffffffffffffffff]) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="9e0000007d010000007000070000f0ffff820402000005000000000000000000000007000000090000003d0700000000000030005e26736d696d655f74776c616e3029656d30706f7369785f61636c5f6163636573734c736563757269747925400a0040776c616e307d2d655d0300255e2c000019006c6f478e0000006d305b3a6d696d655f74797065656d3030251120498de8fb9548f2daa7704863f5a4546136a7e0f144d0870f54083c4e38a2e2222d82efdc94e4a586ab0f12e3a3d2a82c3b439cc1afcb6ea71b8dcecd15ca6f7afc77b5c885eea1be8cca87d48eb1eede99e7fd7293d9d99626e0412e57c824de7424efd217a47531d440b01caea39fad4124fc85e7bc2073849b9d8d53e974d9434206159b29fde0ef3a9b95979fbea74f24c54100", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3], 0x9e) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) socket$vsock_dgram(0x28, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r4, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:41:48 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cfe9c65120b091f412cdfd9f58bbafce550defc2c31e83f371b14d08ba72813330edd39173dffaa6bd0267b46bc8f38c49d52dbb0d07ddbc4b5c016e4a95b75eb98d0b33c7850dbe0c87933590495fec9e3902dd3879ecea9e79a0159c36d918cdbf118175873e2f90d01fea197273784421f664482b3b6a674023a398bc9f54ae2d2d4d"}, 0x10) 18:41:48 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x110) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) getgroups(0x3, &(0x7f0000000080)=[0xee01, 0xee01, 0xffffffffffffffff]) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3], 0x9e) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r4, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r4, &(0x7f0000000080)}, 0x10) [ 498.212371] RBP: 00000000009300a0 R08: 0000000000000248 R09: 0000000000000000 [ 498.220081] R10: 0000000020000100 R11: 0000000000000246 R12: 0000000000000004 [ 498.227426] R13: 00000000004d4f68 R14: 00000000004c92a5 R15: 0000000000000000 [ 498.235087] syz-executor1: vmalloc: allocation failure: 256 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 498.245408] syz-executor1 cpuset=syz1 mems_allowed=0 [ 498.250797] CPU: 1 PID: 22585 Comm: syz-executor1 Not tainted 4.19.0-rc1+ #42 [ 498.258142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 498.267556] Call Trace: [ 498.270237] dump_stack+0x14b/0x190 [ 498.273979] warn_alloc+0x472/0x690 [ 498.277730] __vmalloc_node_range+0x203/0x1140 [ 498.282443] vmalloc+0xd8/0xf0 [ 498.285765] ? do_replace+0x359/0x780 [ 498.289849] do_replace+0x359/0x780 [ 498.293633] do_ebt_set_ctl+0x2a7/0x3b0 [ 498.297885] ? try_module_get+0x52/0x3c0 [ 498.302087] ? nf_setsockopt+0x16f/0x4e0 [ 498.306248] ? ebt_cleanup_entry+0xae0/0xae0 [ 498.310847] nf_setsockopt+0x47c/0x4e0 [ 498.314877] ip_setsockopt+0x344/0x3b0 [ 498.318898] udp_setsockopt+0x108/0x1b0 [ 498.322991] ? udp_lib_setsockopt+0xb60/0xb60 [ 498.327607] sock_common_setsockopt+0x13b/0x170 [ 498.332626] ? sock_common_recvmsg+0x270/0x270 [ 498.337376] __sys_setsockopt+0x496/0x540 [ 498.341682] __se_sys_setsockopt+0xdd/0x100 [ 498.346423] __x64_sys_setsockopt+0x62/0x80 [ 498.350986] do_syscall_64+0xb8/0x100 [ 498.354866] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 498.360303] RIP: 0033:0x457099 [ 498.363570] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 498.382809] RSP: 002b:00007f551014fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 498.390616] RAX: ffffffffffffffda RBX: 00007f55101506d4 RCX: 0000000000457099 [ 498.397969] RDX: 0000000000000080 RSI: 0000000000000000 RDI: 0000000000000003 [ 498.405349] RBP: 00000000009300a0 R08: 0000000000000248 R09: 0000000000000000 [ 498.412904] R10: 0000000020000100 R11: 0000000000000246 R12: 0000000000000004 [ 498.420246] R13: 00000000004d4f68 R14: 00000000004c92a5 R15: 0000000000000000 [ 498.427815] Mem-Info: [ 498.430437] active_anon:250702 inactive_anon:110 isolated_anon:0 [ 498.430437] active_file:4472 inactive_file:10255 isolated_file:0 [ 498.430437] unevictable:0 dirty:74 writeback:0 unstable:0 [ 498.430437] slab_reclaimable:3850 slab_unreclaimable:14648 [ 498.430437] mapped:71426 shmem:120 pagetables:9064 bounce:0 [ 498.430437] free:189154 free_pcp:1092 free_cma:0 [ 498.464758] Node 0 active_anon:1000696kB inactive_anon:440kB active_file:17888kB inactive_file:41020kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:285704kB dirty:296kB writeback:0kB shmem:480kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 940032kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 498.493103] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 498.519754] lowmem_reserve[]: 0 2833 7259 7259 [ 498.524527] Node 0 DMA32 free:701472kB min:26324kB low:32904kB high:39484kB active_anon:496188kB inactive_anon:32kB active_file:396kB inactive_file:1788kB unevictable:0kB writepending:24kB present:3129332kB managed:2906092kB mlocked:0kB kernel_stack:23104kB pagetables:18712kB bounce:0kB free_pcp:1684kB local_pcp:1096kB free_cma:0kB [ 498.554406] lowmem_reserve[]: 0 0 4425 4425 [ 498.559010] Node 0 Normal free:51228kB min:41112kB low:51388kB high:61664kB active_anon:500292kB inactive_anon:408kB active_file:17492kB inactive_file:39232kB unevictable:0kB writepending:272kB present:4718592kB managed:4532152kB mlocked:0kB kernel_stack:23808kB pagetables:17544kB bounce:0kB free_pcp:2664kB local_pcp:1304kB free_cma:0kB [ 498.589321] lowmem_reserve[]: 0 0 0 0 [ 498.593348] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB 18:41:48 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:48 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="18aa240800000013de00eeca720000000000000001ced27debeb05a800006d7e63f7694dac3b7e0cbb7d33eebc8adbcdc1f6e5fc2adbbb6cb4cd89e847692f4a0c6b12f9cc0609b79f802bb1da75210384a93ec3ac06815b9ca37ad7e0f3aa4ae67aa7bb2ef4f7febb0c0c595fe2d9ca7550bd6c4ece2276b5ef9d78376c0a6b7bd3eef376293d9604273668c374511e5b7106ab7ee98168ee5d724d7021380dbc6fc410e7ad88a4ec96278e92871059ca166d3652c4d5fd5d93a2ddbacd015513b366d973a8c3f0581788bfe702201a63d851d6e762bee30f09bdba7eb381aad4ee53dec67cf5564e2fe6e500fb4b5fa406b0af25819920439554f4cfc95ae71d1992b94f54a7e2f039cc3f08a6cd1dfef6469cd4c5414c95e461a650c4e9bdb8da78bd79893c7cc63f83fc986f0af98e477bbe6ac4e1337d414e13674e803e849abf438342f1a0d9c1d28cd135e6fc5f4bf8d825e799b0ab"}, 0x10) [ 498.606897] Node 0 DMA32: 62*4kB (UM) 701*8kB (UM) 243*16kB (U) 86*32kB (UME) 23*64kB (UM) 11*128kB (UME) 12*256kB (UME) 5*512kB (ME) 4*1024kB (UM) 4*2048kB (UME) 163*4096kB (UM) = 700944kB [ 498.624418] Node 0 Normal: 505*4kB (UM) 1351*8kB (UM) 922*16kB (UME) 366*32kB (UME) 118*64kB (UM) 13*128kB (UME) 5*256kB (U) 1*512kB (U) 1*1024kB (U) 0*2048kB 0*4096kB = 51324kB [ 498.640855] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 498.649739] 14846 total pagecache pages [ 498.653825] 0 pages in swap cache [ 498.657422] Swap cache stats: add 0, delete 0, find 0/0 [ 498.662887] Free swap = 0kB 18:41:48 executing program 5 (fault-call:5 fault-nth:1): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) [ 498.666025] Total swap = 0kB [ 498.669161] 1965979 pages RAM [ 498.672537] 0 pages HighMem/MovableOnly [ 498.676607] 102442 pages reserved 18:41:48 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x110) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) getgroups(0x3, &(0x7f0000000080)=[0xee01, 0xee01, 0xffffffffffffffff]) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3], 0x9e) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080)}, 0x10) 18:41:48 executing program 7: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x110) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) getgroups(0x3, &(0x7f0000000080)=[0xee01, 0xee01, 0xffffffffffffffff]) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3], 0x9e) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r4, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:41:48 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x81, 0x101002) fcntl$addseals(r0, 0x409, 0x5) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f00000001c0)={0x1, {r1, r2+10000000}, 0x40}) write$P9_RSYMLINK(r0, &(0x7f00000003c0)={0xffffffffffffff1c, 0x11, 0x2, {0x2, 0x2}}, 0x6) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000300)=[0xffffffffffffe82b, 0x91e]) r4 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xac5, 0x10002) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r3, &(0x7f0000000080), &(0x7f0000000240)="c71d1f5f10daabd1286f05de12717b0de6a512364121446b581f25b76c884b2ad6b67e008e3c710c1a2267a7d7832fbeea6f74b69b5126fc056cd45f26afd682878ceb0afb3dc77407f3ee810819f3e752d80e5d4992ec854f05f9293dbc94db43f0fa3b9e1e24b448bde54345ead7210a63e14e496e88fda189894d9eb95b5d4ba08ba5a97ca62cb35ecbbe62a6364470474aeb9cd789"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r3, &(0x7f0000000080)}, 0x10) fstatfs(r0, &(0x7f0000000340)=""/52) ioctl$EVIOCSFF(r4, 0x40304580, &(0x7f0000000080)={0x57, 0x1000, 0xfff, {0x1, 0xa46}, {0x200, 0x10001}, @period={0x5b, 0x1c00, 0xfffffffffffffffe, 0xdf, 0x8b, {0x2, 0xfffffffffffffffc, 0x9, 0x6e}, 0x2, &(0x7f0000000040)=[0x7fff, 0x40]}}) 18:41:48 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cfe9c65120b091f412cdfd9f58bbafce550defc2c31e83f371b14d08ba72813330edd39173dffaa6bd0267b46bc8f38c49d52dbb0d07ddbc4b5c016e4a95b75eb98d0b33c7850dbe0c87933590495fec9e3902dd3879ecea9e79a0159c36d918cdbf118175873e2f90d01fea197273784421f664482b3b6a674023a398bc9f54ae2d2d4d"}, 0x10) [ 498.938457] FAULT_INJECTION: forcing a failure. [ 498.938457] name failslab, interval 1, probability 0, space 0, times 0 [ 498.949944] CPU: 1 PID: 22615 Comm: syz-executor5 Not tainted 4.19.0-rc1+ #42 [ 498.957423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 498.966974] Call Trace: [ 498.969680] dump_stack+0x14b/0x190 [ 498.973529] should_fail+0xa98/0xaa0 [ 498.977529] __should_failslab+0x278/0x2a0 [ 498.981913] should_failslab+0x29/0x70 [ 498.985898] kmem_cache_alloc+0x127/0xb20 [ 498.990181] ? __d_alloc+0x98/0xe40 [ 498.993934] ? vmalloc_to_page_or_null+0x3b/0xa0 [ 498.998927] __d_alloc+0x98/0xe40 [ 499.002464] ? kmsan_set_origin_inline+0x6b/0x120 [ 499.007449] d_alloc+0x97/0x4e0 [ 499.010843] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 499.016389] ? d_lookup+0x1da/0x200 [ 499.020115] __lookup_hash+0x1b0/0x510 [ 499.024405] filename_create+0x302/0xa90 [ 499.028602] do_mkdirat+0x10c/0x670 [ 499.032397] __se_sys_mkdirat+0x92/0xb0 [ 499.036466] __x64_sys_mkdirat+0x4a/0x70 [ 499.040627] do_syscall_64+0xb8/0x100 [ 499.044535] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 499.049827] RIP: 0033:0x457099 [ 499.053103] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 499.072075] RSP: 002b:00007fad91a17c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 499.080010] RAX: ffffffffffffffda RBX: 00007fad91a186d4 RCX: 0000000000457099 [ 499.087375] RDX: 0000000000000000 RSI: 0000000020000500 RDI: ffffffffffffff9c [ 499.094860] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 499.102207] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 499.109862] R13: 00000000004d3090 R14: 00000000004c8107 R15: 0000000000000001 18:41:49 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x10) 18:41:49 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000240)={0x84, 0x0, 0x3, 0x10001, 0x6, [{0x8001, 0x4, 0x100}, {0x3f, 0x10000, 0xff, 0x0, 0x0, 0x1}, {0x3, 0x8, 0x7, 0x0, 0x0, 0x200}, {0x2, 0x80, 0x8000, 0x0, 0x0, 0x80}, {0x6, 0x4000000000000000, 0x7, 0x0, 0x0, 0x400}, {0x5, 0x94c5, 0x5, 0x0, 0x0, 0x100}]}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:49 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x110) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) getgroups(0x3, &(0x7f0000000080)=[0xee01, 0xee01, 0xffffffffffffffff]) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:49 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffd, 0x1, [{{{0x9, 0x1, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [0x0, 0x0, 0x0, 0x3], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10001, 0x101201) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000040)=0x1) getsockname$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000180)=0x1c) 18:41:49 executing program 7: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x110) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) getgroups(0x3, &(0x7f0000000080)=[0xee01, 0xee01, 0xffffffffffffffff]) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3], 0x9e) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:41:49 executing program 5 (fault-call:5 fault-nth:2): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:49 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cfe9c65120b091f412cdfd9f58bbafce550defc2c31e83f371b14d08ba72813330edd39173dffaa6bd0267b46bc8f38c49d52dbb0d07ddbc4b5c016e4a95b75eb98d0b33c7850dbe0c87933590495fec9e3902dd3879ecea9e79a0159c36d918cdbf118175873e2f90d01fea197273784421f664482b3b6a674023a398bc9f54ae2d2d4d"}, 0x10) 18:41:49 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000240)="f00de73429aaa366ec0658acacc0d66ab4b22bc7609c66911fc0b0f9db5aad6eafc299863797590e3572b488f052f0feb1d945245459ad8fa3ef9109855c77b5b0a81e4c5f303b22a01c6fa6f6bb2da7f6454a2e26b1168b5602d6c8772c3da77787af790f6ebd46865fed73b14889680777df86f0fddab565ac467e286d3b4987e17b64e66374a1263233386f06535523d4ef57decad3", &(0x7f0000000040)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x2040, 0x0) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000180)) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f0000000080)=""/16, &(0x7f0000000100)=0x10) 18:41:49 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x10) [ 499.717618] kernel msg: ebtables bug: please report to author: bad policy [ 499.739066] FAULT_INJECTION: forcing a failure. [ 499.739066] name failslab, interval 1, probability 0, space 0, times 0 [ 499.750883] CPU: 1 PID: 22653 Comm: syz-executor5 Not tainted 4.19.0-rc1+ #42 [ 499.758385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 18:41:49 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:49 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x110) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) getgroups(0x3, &(0x7f0000000080)=[0xee01, 0xee01, 0xffffffffffffffff]) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) [ 499.767919] Call Trace: [ 499.770611] dump_stack+0x14b/0x190 [ 499.774777] should_fail+0xa98/0xaa0 [ 499.778602] __should_failslab+0x278/0x2a0 [ 499.782986] should_failslab+0x29/0x70 [ 499.787108] __kmalloc+0xbe/0x350 [ 499.791457] ? fuse_dentry_init+0x59/0x120 [ 499.795862] ? fuse_dentry_revalidate+0x11d0/0x11d0 [ 499.801022] fuse_dentry_init+0x59/0x120 [ 499.805225] ? fuse_dentry_revalidate+0x11d0/0x11d0 [ 499.810416] __d_alloc+0x7f6/0xe40 [ 499.814089] d_alloc+0x97/0x4e0 [ 499.817479] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 499.822983] ? d_lookup+0x1da/0x200 [ 499.826778] __lookup_hash+0x1b0/0x510 [ 499.830880] filename_create+0x302/0xa90 [ 499.835081] do_mkdirat+0x10c/0x670 [ 499.838829] __se_sys_mkdirat+0x92/0xb0 [ 499.842882] __x64_sys_mkdirat+0x4a/0x70 [ 499.847016] do_syscall_64+0xb8/0x100 [ 499.850895] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 499.856157] RIP: 0033:0x457099 [ 499.857253] kernel msg: ebtables bug: please report to author: bad policy [ 499.859422] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 499.859442] RSP: 002b:00007fad91a17c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 499.859482] RAX: ffffffffffffffda RBX: 00007fad91a186d4 RCX: 0000000000457099 [ 499.859504] RDX: 0000000000000000 RSI: 0000000020000500 RDI: ffffffffffffff9c [ 499.859524] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 18:41:49 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000240)="2f3b806a53cfe9c65120b091f412cdfd9f58bbafce550defc2c31e83f371b14d08ba72813330edd39173dffaa6bd0267b46bc8f38c49d52dbb0d07ddbc4b5c016e4a95b75eb98d0b33c7850dbe0c87933590495fec9e3902dd3879ecea9e79a0159c36d918cdbf118175873e2f90d01fea197273784421f664482b3b6a674023a398bc9f54ae2d2d4d"}, 0x10) 18:41:49 executing program 7: creat(&(0x7f0000000000)='./file0\x00', 0x110) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) getgroups(0x3, &(0x7f0000000080)=[0xee01, 0xee01, 0xffffffffffffffff]) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) [ 499.859559] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 499.922944] R13: 00000000004d3090 R14: 00000000004c8107 R15: 0000000000000002 18:41:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4, 0x0, 0xffffffffffffffff, 0x800000000}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:50 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x10) 18:41:50 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x110) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:50 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000e26dc8ffffffffff000000ffffffff0100000009000000000000020000766c616e3000000000000000000000007663616e30000000000200000000000079616d300000f7ffffff00000000000065727370616e300000020000000000000180c2000000000000000000000000000000000000000000000056d1045d43a7c9e760bd98025ace32aa7000000070000000a0000000726564697265638d0000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000fcffffff0100000003000000000000000000626f6e645f736c6176655f3100000000697036677265746170f1ad3114000000090000000000000076655f3100000000766574683000000000000000002c9753173a635d125f303540415b6c3d000000ffffffffffff0000000000000180c200000000000000000000007000000070000000a00000004e46515545554500000000000000000000000000000000000000000000000000080000000000000000000000000000006e7139"]}, 0x26b) 18:41:50 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) shmget(0x0, 0x1000, 0x90, &(0x7f0000ffc000/0x1000)=nil) r1 = syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0xfffffffffffffffa, 0x400002) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000400)={0x0, 0xee, "a638ddb72c65ade2f3952346ab4c315e18ce4781624b70b4cddc2eb3c7f7d7e35794155d287f49b52cc2690f93c829e2f7e4648d47b3f851fd79db0dc36ec89f421f35ead7ef30d9c90567be08e2b70df701e4ae90455c60d5bbd0bf49cc3fafc2b6fc255a23347f12f7baabaa16c4b842d415274de54f226eb94d4ab5415ceeaa8b79982c4901b83b8a3e9d711bd3014661d6b48efa8bc6578e1ec1113c991df91a942d998bd9b3460316e896902e1348a9cfc71756ac81bac8cb0cd65e3294df8fc9c4e56527299d3951f18d4b6de2d0197e72cd0537e53f9369528bb6ba12bbe299fbe4568d4198a602361cd4"}, &(0x7f0000000500)=0xf6) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000540)={r2, @in={{0x2, 0x4e23, @broadcast}}, 0x9, 0x4, 0x8001, 0xffffffff, 0x1}, &(0x7f0000000600)=0x98) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000000)="eb98bd3ca89a4f0307b6df9c84a6a22ebabcf038330820ab9cbb67fc5208fb8ea818caf49a53483e568f9b14025e3c47f8be565f0b02708c101d6bea250acac466b066e5a197c1428ef7b23d79"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:50 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000240)="2f3b806a53cfe9c65120b091f412cdfd9f58bbafce550defc2c31e83f371b14d08ba72813330edd39173dffaa6bd0267b46bc8f38c49d52dbb0d07ddbc4b5c016e4a95b75eb98d0b33c7850dbe0c87933590495fec9e3902dd3879ecea9e79a0159c36d918cdbf118175873e2f90d01fea197273784421f664482b3b6a674023a398bc9f54ae2d2d4d"}, 0x10) 18:41:50 executing program 7: creat(&(0x7f0000000000)='./file0\x00', 0x110) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) getgroups(0x3, &(0x7f0000000080)=[0xee01, 0xee01, 0xffffffffffffffff]) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) [ 500.393390] kernel msg: ebtables bug: please report to author: Wrong len argument [ 500.498824] kernel msg: ebtables bug: please report to author: Wrong len argument 18:41:50 executing program 5 (fault-call:5 fault-nth:3): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:50 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x10) 18:41:50 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x110) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='\x00'}, 0x10) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000240)=""/209) 18:41:50 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000240)="2f3b806a53cfe9c65120b091f412cdfd9f58bbafce550defc2c31e83f371b14d08ba72813330edd39173dffaa6bd0267b46bc8f38c49d52dbb0d07ddbc4b5c016e4a95b75eb98d0b33c7850dbe0c87933590495fec9e3902dd3879ecea9e79a0159c36d918cdbf118175873e2f90d01fea197273784421f664482b3b6a674023a398bc9f54ae2d2d4d"}, 0x10) 18:41:50 executing program 1: r0 = shmget$private(0x0, 0x3000, 0x104, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) r2 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x1, 0x400000) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000100), &(0x7f0000000140)=0x4) 18:41:50 executing program 7: creat(&(0x7f0000000000)='./file0\x00', 0x110) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:41:51 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x401, 0x40) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x6, 0x3, [0x1, 0x0, 0x7fff]}, &(0x7f0000000080)=0xe) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100)={r2, 0x200, 0x9}, 0x8) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) [ 501.010964] FAULT_INJECTION: forcing a failure. [ 501.010964] name failslab, interval 1, probability 0, space 0, times 0 [ 501.022500] CPU: 0 PID: 22722 Comm: syz-executor5 Not tainted 4.19.0-rc1+ #42 [ 501.029852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 501.039257] Call Trace: [ 501.041945] dump_stack+0x14b/0x190 [ 501.045627] should_fail+0xa98/0xaa0 [ 501.049439] __should_failslab+0x278/0x2a0 [ 501.053772] should_failslab+0x29/0x70 [ 501.057743] __kmalloc+0xbe/0x350 18:41:51 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="18aa240800000013de00eeca720000000000000001ced27debeb05a800006d7e63f7694dac3b7e0cbb7d33eebc8adbcdc1f6e5fc2adbbb6cb4cd89e847692f4a0c6b12f9cc0609b79f802bb1da75210384a93ec3ac06815b9ca37ad7e0f3aa4ae67aa7bb2ef4f7febb0c0c595fe2d9ca7550bd6c4ece2276b5ef9d78376c0a6b7bd3eef376293d9604273668c374511e5b7106ab7ee98168ee5d724d7021380dbc6fc410e7ad88a4ec96278e92871059ca166d3652c4d5fd5d93a2ddbacd015513b366d973a8c3f0581788bfe702201a63d851d6e762bee30f09bdba7eb381aad4ee53dec67cf5564e2fe6e500fb4b5fa406b0af25819920439554f4cfc95ae71d1992b94f54a7e2f039cc3f08a6cd1dfef6469cd4c5414c95e461a650c4e9bdb8da78bd79893c7cc63f83fc986f0af98e477bbe6ac4e1337d414e13674e803e849abf438342f1a0d9c1d28cd135e6fc5f4bf8d825e799b0ab59a2b8cf76da9b17abd301980976c9498ab9f816b60b92b8889a7a8307d37877bd7b15b4104edb78e826951eaefe4a3d8fb02f1c198c7db9f7a182e35e18cc82ac9f2cf092b8463ff8bf1e683032e520b2bd8d1684a0be2cde0c4e21e33a75058be3d23ac8205433535078bf7e7d3139367f6967145386c179f8e92e7847210512ef2eae4cd56d34b7866d42749f1e0892902db200d54786c81ade2b11bfe7e2fb7e9e1b9ffb0af1ea61f786f82d2104dc55c22eea28829570645959cdee44c860c467aa6f0de5dc178af8cca80f7beeb185130327476fe6589fd684c76870ae768c38ab2cc6e172757e6d4f87b5f95196566e06a4e1bc9218a83486047cf258f1cb"}, 0x10) [ 501.061290] ? fuse_alloc_forget+0x40/0x90 [ 501.065632] fuse_alloc_forget+0x40/0x90 [ 501.069788] fuse_lookup_name+0x1cd/0xb50 [ 501.074029] ? rcu_all_qs+0x2e/0x1f0 [ 501.077817] ? mutex_lock+0x89/0xf0 [ 501.081547] fuse_lookup+0x184/0x750 [ 501.085360] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 501.090813] ? __list_add_valid+0xb8/0x450 [ 501.095149] ? d_alloc+0x3ee/0x4e0 [ 501.098791] ? fuse_getattr+0x880/0x880 [ 501.102811] __lookup_hash+0x26c/0x510 [ 501.106763] filename_create+0x302/0xa90 [ 501.110935] do_mkdirat+0x10c/0x670 [ 501.114656] __se_sys_mkdirat+0x92/0xb0 [ 501.118687] __x64_sys_mkdirat+0x4a/0x70 [ 501.122814] do_syscall_64+0xb8/0x100 [ 501.126679] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 501.131929] RIP: 0033:0x457099 [ 501.135173] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 501.154146] RSP: 002b:00007fad91a17c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 18:41:51 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:51 executing program 7: creat(&(0x7f0000000000)='./file0\x00', 0x110) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:41:51 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000080)=0x0) sched_setparam(r1, &(0x7f0000000380)=0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x200, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000180], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [0x0, 0x0, 0x0, 0x1], 0xa0, 0xa0, 0xd0, [@vlan={'vlan\x00', 0x8, {{0x0, 0x3, 0x9200, 0x3, 0x2}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x278) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') [ 501.161941] RAX: ffffffffffffffda RBX: 00007fad91a186d4 RCX: 0000000000457099 [ 501.169301] RDX: 0000000000000000 RSI: 0000000020000500 RDI: ffffffffffffff9c [ 501.176644] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 501.183979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 501.191328] R13: 00000000004d3090 R14: 00000000004c8107 R15: 0000000000000003 18:41:51 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:51 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:51 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)}, 0x10) 18:41:51 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x10) 18:41:51 executing program 5 (fault-call:5 fault-nth:4): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:51 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000040), &(0x7f0000000000)="337fc557c7814d95071d9e762ddb7367c73d5a859cdb1d71dcaf5ac27de577a781285f6f400c607731246442e8af1f7970f6a1df1d4fd2f787ff877d"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:51 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) pipe2(&(0x7f0000001d00)={0xffffffffffffffff}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000003c0)={{{@in6, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_buf(r0, 0x0, 0x2d, &(0x7f00000000c0)=""/158, &(0x7f00000006c0)=0x9e) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001e80)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f0000000600)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@dev={0xac, 0x14, 0x14, 0xc}, @in6=@loopback, 0x4e24, 0x0, 0x4e22, 0x0, 0xa, 0x0, 0x20, 0x87, r2, r3}, {0x8, 0x7, 0x0, 0x0, 0xfda3, 0x4, 0xa9, 0x1f}, {0x7fffffff0000000, 0x9, 0x9, 0x5}, 0x2a68, 0x6e6bb0, 0x2, 0xe469fa751d6d858f, 0x2}, {{@in=@loopback, 0x4d4, 0xff}, 0x0, @in, 0x3504, 0x4, 0x1, 0x3, 0x7fff, 0xa7b4, 0x1000}}, 0xe8) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000500)='/dev/rfkill\x00', 0x400000, 0x0) epoll_create(0x4) ioctl$TIOCMBIC(r4, 0x5417, &(0x7f0000000040)=0x7713) recvmsg$kcm(r4, &(0x7f0000001e40)={&(0x7f0000000180)=@l2, 0xfffffde9, &(0x7f0000000700)=[{&(0x7f0000000080)=""/36, 0xfffffffffffffe88}, {&(0x7f0000000200)=""/184, 0xb8}, {&(0x7f00000002c0)=""/216, 0xd8}, {&(0x7f0000000640)=""/92, 0x2b}, {&(0x7f00000007c0)=""/158, 0x9e}, {&(0x7f0000000a80)=""/245, 0xf5}, {&(0x7f0000000b80)=""/128, 0x80}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f0000001c00)=""/237, 0xed}], 0x9, &(0x7f0000001dc0)=""/99, 0x63, 0xf4}, 0x100) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x80, &(0x7f0000000540)=[@in6={0xa, 0x4e23, 0xcbff, @local, 0x400}, @in6={0xa, 0x4e21, 0x80000000}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e23, 0xfffffffffffffff8, @empty, 0x8}, @in6={0xa, 0x4e23, 0xff, @mcast2, 0x81}]}, &(0x7f00000005c0)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f00000009c0)={r5, @in={{0x2, 0x4e21, @rand_addr=0x3}}, 0x6, 0x80000001, 0x100000000, 0x1, 0x866}, &(0x7f0000000880)=0x98) 18:41:51 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:41:51 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)}, 0x10) 18:41:51 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x0, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:51 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x10) [ 502.036507] FAULT_INJECTION: forcing a failure. [ 502.036507] name failslab, interval 1, probability 0, space 0, times 0 [ 502.048085] CPU: 0 PID: 22779 Comm: syz-executor5 Not tainted 4.19.0-rc1+ #42 [ 502.055429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 502.064843] Call Trace: [ 502.067506] dump_stack+0x14b/0x190 [ 502.071220] should_fail+0xa98/0xaa0 [ 502.075044] __should_failslab+0x278/0x2a0 [ 502.079386] should_failslab+0x29/0x70 [ 502.083377] kmem_cache_alloc+0x127/0xb20 [ 502.087584] ? __fuse_request_alloc+0x8f/0x6f0 [ 502.092257] ? kmsan_set_origin_inline+0x6b/0x120 [ 502.097186] __fuse_request_alloc+0x8f/0x6f0 [ 502.101696] __fuse_get_req+0x606/0xd20 [ 502.105767] ? kmsan_set_origin+0x93/0x150 [ 502.110113] fuse_simple_request+0x72/0xbb0 [ 502.114581] ? kmsan_set_origin+0x93/0x150 [ 502.118932] fuse_lookup_name+0x41d/0xb50 [ 502.123219] fuse_lookup+0x184/0x750 [ 502.127063] ? d_alloc+0x3ee/0x4e0 [ 502.130715] ? fuse_getattr+0x880/0x880 18:41:52 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x10) [ 502.134753] __lookup_hash+0x26c/0x510 [ 502.138716] filename_create+0x302/0xa90 [ 502.143068] do_mkdirat+0x10c/0x670 [ 502.146902] __se_sys_mkdirat+0x92/0xb0 [ 502.150944] __x64_sys_mkdirat+0x4a/0x70 [ 502.155071] do_syscall_64+0xb8/0x100 [ 502.158935] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 502.164175] RIP: 0033:0x457099 [ 502.167423] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 18:41:52 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:41:52 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r1 = memfd_create(&(0x7f0000000000)='-)+(}\x00', 0x1) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000040)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:52 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x0, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) [ 502.186384] RSP: 002b:00007fad91a17c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 502.194172] RAX: ffffffffffffffda RBX: 00007fad91a186d4 RCX: 0000000000457099 [ 502.201508] RDX: 0000000000000000 RSI: 0000000020000500 RDI: ffffffffffffff9c [ 502.208834] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 502.216156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 502.223481] R13: 00000000004d3090 R14: 00000000004c8107 R15: 0000000000000004 18:41:52 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1}) 18:41:52 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:52 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)}, 0x10) 18:41:52 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:52 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x0, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:41:52 executing program 5 (fault-call:5 fault-nth:5): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:52 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x10001, 0x40) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f0000000040)={0x1, 0x400}) 18:41:52 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x10) 18:41:52 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = add_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000008c0)="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", 0x1000, 0xfffffffffffffffc) keyctl$clear(0x7, r1) r2 = accept4(r0, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @local}, &(0x7f0000000080)=0x80, 0x800) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]}, 0x248) 18:41:52 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x0, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:41:52 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:52 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cfe9c65120b091f412cdfd9f58bbafce550defc2c31e83f371b14d08ba72813330edd39173dffaa6bd0267b46bc8f38c49d52dbb0d07ddbc4b5c016e4a95b75e"}, 0x10) 18:41:53 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:41:53 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x6, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000040)) getsockname$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) recvfrom$packet(r1, &(0x7f0000000180)=""/84, 0x54, 0x2, &(0x7f0000000340)={0x11, 0xf8, r2, 0x1, 0x7, 0x6, @dev={[], 0x1c}}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x7, 0x2, 0x7, 0xffffffffffffff7f, 0x0, 0xaa, 0x40000, 0xa, 0xf80, 0x3, 0x8, 0x4, 0x8, 0x8, 0xfffffffffffffffc, 0x2, 0x5, 0x5351, 0x401, 0x3, 0x6, 0x3, 0xfffffffffffff8b0, 0x9, 0x9, 0x4, 0x9, 0x2, 0x101, 0xc0b, 0x0, 0x1, 0x7, 0x553f, 0x100, 0x9, 0x0, 0x0, 0x2, @perf_config_ext={0x3, 0x81}, 0x440, 0x5, 0x1f, 0x3, 0xf29, 0x7fffffff}, r1, 0x0, r1, 0x8) 18:41:53 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0xffffffffffffffff, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) 18:41:53 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="18aa240800000013de00eeca720000000000000001ced27debeb05a800006d7e63f7694dac3b7e0cbb7d33eebc8adbcdc1f6e5fc2adbbb6cb4cd89e847692f4a0c6b12f9cc0609b79f802bb1da75210384a93ec3ac06815b9ca37ad7e0f3aa4ae67aa7bb2ef4f7febb0c0c595fe2d9ca7550bd6c4ece2276b5ef9d78376c0a6b7bd3eef376293d9604273668c374511e5b7106ab7ee98168ee5d724d7021380dbc6fc410e7ad88a4ec96278e92871059ca166d3652c4d5fd5d93a2ddbacd015513b366d973a8c3f0581788bfe702201a63d851d6e762bee30f09bdba7eb381aad4ee53dec67cf5564e2fe6e500fb4b5fa406b0af25819920439554f4cfc95ae71d1992b94f54a7e2f039cc3f08a6cd1dfef6469cd4c5414c95e461a650c4e9bdb8da78bd79893c7cc63f83fc986f0af98e477bbe6ac4e1337d414e13674e803e849abf438342f1a0d9c1d28cd135e6fc5f4bf8d825e799b0ab59a2b8cf76da9b17abd301980976c9498ab9f816b60b92b8889a7a8307d37877bd7b15b4104edb78e826951eaefe4a3d8fb02f1c198c7db9f7a182e35e18cc82ac9f2cf092b8463ff8bf1e683032e520b2bd8d1684a0be2cde0c4e21e33a75058be3d23ac8205433535078bf7e7d3139367f6967145386c179f8e92e7847210512ef2eae4cd56d34b7866d42749f1e0892902db200d54786c81ade2b11bfe7e2fb7e9e1b9ffb0af1ea61f786f82d2104dc55c22eea28829570645959cdee44c860c467aa6f0de5dc178af8cca80f7beeb185130327476fe6589fd684c76870ae768c38ab2cc6e172757e6d4f87b5f95196566e06a4e1bc9218a83486047cf258f1cbe3b975885e3d37b98f3cf74c468005626f1bf1945c085e5a355620a4548916adba564ae80f11f5e401ce77"}, 0x10) 18:41:53 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:53 executing program 2: syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x100000001, 0x100) write$P9_RCREATE(r1, &(0x7f0000000040)={0x18, 0x73, 0x2, {{0xf7, 0x2, 0x8}, 0xfffffffffffffff7}}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:53 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x14000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)={0x2, [0x0, 0x0]}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000180)={r1, 0x7fffffff, 0xd}, 0x8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@broute={'broute\x00', 0x20, 0x1, 0x1a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f00000000c0), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [0x2, 0x0, 0x0, 0x1], @empty, [], 0xe0, 0xe0, 0x110, [@vlan={'vlan\x00', 0x8, {{0x4, 0x0, 0x892f, 0x6, 0x1}}}, @devgroup={'devgroup\x00', 0x18, {{0xd, 0x0, 0x3, 0x4, 0x55}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x218) 18:41:53 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)='/'}, 0x10) 18:41:53 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:41:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) socket(0x1e, 0x806, 0x3fe) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x10080) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f00000000c0)) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:53 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:53 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:53 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x10) 18:41:53 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x0, @local}, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000240)={0x0, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000000)=0x5dd7d56b, 0x4) r1 = syz_open_dev$adsp(&(0x7f00000004c0)='/dev/adsp#\x00', 0x0, 0x1) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000200)=0x80000) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r3 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000140)={{0x1000000, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0x4, 0x0, 0x1, 0x0, 'syz1\x00', &(0x7f0000000000)=["07e646d40000000000"], 0x9, [], [0x4]}) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001380)={0x0, @loopback, @loopback}, &(0x7f0000000340)=0xc) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000080)=@ll={0x11, 0x0, r4, 0x1, 0x1}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000580)="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", 0xdfd}], 0x1, &(0x7f0000001580), 0x0, 0x20000040}, 0x8000) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000001540)={0x1, 'team_slave_0\x00', 0x2}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000001440)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000001400)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000001480)={0x16, 0x6a, 0xfa00, {&(0x7f00000013c0), 0x3, r6, 0x30, 0x0, @in={0x2, 0x4e21}}}, 0x338) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) 18:41:53 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:41:53 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:53 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)='/'}, 0x10) 18:41:53 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r0, 0x0, 0x1, 0x38, 0xcaf}) 18:41:54 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="18aa240800000013de00eeca720000000000000001ced27debeb05a800006d7e63f7694dac3b7e0cbb7d33eebc8adbcdc1f6e5fc2adbbb6cb4cd89e847692f4a0c6b12f9cc0609b79f802bb1da75210384a93ec3ac06815b9ca37ad7e0f3aa4ae67aa7bb2ef4f7febb0c0c595fe2d9ca7550bd6c4ece2276b5ef9d78376c0a6b7bd3eef376293d9604273668c374511e5b7106ab7ee98168ee5d724d7021380dbc6fc410e7ad88a4ec96278e92871059ca166d3652c4d5fd5d93a2ddbacd015513b366d973a8c3f0581788bfe702201a63d851d6e762bee30f09bdba7eb381aad4ee53dec67cf5564e2fe6e500fb4b5fa406b0af25819920439554f4cfc95ae71d1992b94f54a7e2f039cc3f08a6cd1dfef6469cd4c5414c95e461a650c4e9bdb8da78bd79893c7cc63f83fc986f0af98e477bbe6ac4e1337d414e13674e803e849abf438342f1a0d9c1d28cd135e6fc5f4bf8d825e799b0ab59a2b8cf76da9b17abd301980976c9498ab9f816b60b92b8889a7a8307d37877bd7b15b4104edb78e826951eaefe4a3d8fb02f1c198c7db9f7a182e35e18cc82ac9f2cf092b8463ff8bf1e683032e520b2bd8d1684a0be2cde0c4e21e33a75058be3d23ac8205433535078bf7e7d3139367f6967145386c179f8e92e7847210512ef2eae4cd56d34b7866d42749f1e0892902db200d54786c81ade2b11bfe7e2fb7e9e1b9ffb0af1ea61f786f82d2104dc55c22eea28829570645959cdee44c860c467aa6f0de5dc178af8cca80f7beeb185130327476fe6589fd684c76870ae768c38ab2cc6e172757e6d4f87b5f95196566e06a4e1bc9218a83486047cf258f1cbe3b975885e3d37b98f3cf74c468005626f1bf1945c085e5a355620a4548916adba564ae80f11f5e401ce7764ef5006d5cebc20dbd0adcb2009126370f78a729cad"}, 0x10) 18:41:54 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x4}, 0x10) 18:41:54 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080)}, 0x10) 18:41:54 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:41:54 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:54 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x81, 0x82000) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000040)={0x5, 0x200, 0x18, 0x7, 0x0}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000001c0)=@int=0x1, 0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000100)={r2}, &(0x7f0000000180)=0x8) 18:41:54 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)='/'}, 0x10) 18:41:54 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x10) 18:41:54 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:54 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:41:54 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x10) 18:41:55 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x249) 18:41:55 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cfe9c65120b091f412cdfd9f58bbafce550defc2c31e83f371b14d08ba72"}, 0x10) 18:41:55 executing program 7 (fault-call:2 fault-nth:0): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:41:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000000)="5d006473d6607e261c629abfb9d961008351433bfc7abe96249a1cd14c46b0e5b79fd8e1e7743e62379929b8c2", &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:55 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x10) [ 505.258572] FAULT_INJECTION: forcing a failure. [ 505.258572] name failslab, interval 1, probability 0, space 0, times 0 [ 505.270014] CPU: 1 PID: 22947 Comm: syz-executor7 Not tainted 4.19.0-rc1+ #42 [ 505.277349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 505.286746] Call Trace: [ 505.289412] dump_stack+0x14b/0x190 [ 505.293124] should_fail+0xa98/0xaa0 [ 505.296901] __should_failslab+0x278/0x2a0 [ 505.301223] should_failslab+0x29/0x70 [ 505.305176] __kmalloc_track_caller+0x1f4/0xc60 [ 505.309897] ? __do_sys_bpf+0x5610/0xe860 [ 505.314091] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 505.319531] ? __fget_light+0x1f1/0x700 [ 505.323566] memdup_user+0x7c/0x1e0 [ 505.327281] __do_sys_bpf+0x5610/0xe860 [ 505.331372] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 505.336905] ? prepare_exit_to_usermode+0x13f/0x410 [ 505.342001] ? syscall_return_slowpath+0xdb/0x700 [ 505.346959] __se_sys_bpf+0x8e/0xa0 [ 505.350638] __x64_sys_bpf+0x4a/0x70 [ 505.354404] do_syscall_64+0xb8/0x100 [ 505.358260] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 505.363497] RIP: 0033:0x457099 [ 505.366749] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 505.385714] RSP: 002b:00007fc570d13c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 505.393492] RAX: ffffffffffffffda RBX: 00007fc570d146d4 RCX: 0000000000457099 [ 505.400817] RDX: 0000000000000020 RSI: 0000000020000200 RDI: 0000000000000002 18:41:55 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="18aa240800000013de00eeca720000000000000001ced27debeb05a800006d7e63f7694dac3b7e0cbb7d33eebc8adbcdc1f6e5fc2adbbb6cb4cd89e847692f4a0c6b12f9cc0609b79f802bb1da75210384a93ec3ac06815b9ca37ad7e0f3aa4ae67aa7bb2ef4f7febb0c0c595fe2d9ca7550bd6c4ece2276b5ef9d78376c0a6b7bd3eef376293d9604273668c374511e5b7106ab7ee98168ee5d724d7021380dbc6fc410e7ad88a4ec96278e92871059ca166d3652c4d5fd5d93a2ddbacd015513b366d973a8c3f0581788bfe702201a63d851d6e762bee30f09bdba7eb381aad4ee53dec67cf5564e2fe6e500fb4b5fa406b0af25819920439554f4cfc95ae71d1992b94f54a7e2f039cc3f08a6cd1dfef6469cd4c5414c95e461a650c4e9bdb8da78bd79893c7cc63f83fc986f0af98e477bbe6ac4e1337d414e13674e803e849abf438342f1a0d9c1d28cd135e6fc5f4bf8d825e799b0ab59a2b8cf76da9b17abd301980976c9498ab9f816b60b92b8889a7a8307d37877bd7b15b4104edb78e826951eaefe4a3d8fb02f1c198c7db9f7a182e35e18cc82ac9f2cf092b8463ff8bf1e683032e520b2bd8d1684a0be2cde0c4e21e33a75058be3d23ac8205433535078bf7e7d3139367f6967145386c179f8e92e7847210512ef2eae4cd56d34b7866d42749f1e0892902db200d54786c81ade2b11bfe7e2fb7e9e1b9ffb0af1ea61f786f82d2104dc55c22eea28829570645959cdee44c860c467aa6f0de5dc178af8cca80f7beeb185130327476fe6589fd684c76870ae768c38ab2cc6e172757e6d4f87b5f95196566e06a4e1bc9218a83486047cf258f1cbe3b975885e3d37b98f3cf74c468005626f1bf1945c085e5a355620a4548916adba564ae80f11f5e401ce7764ef5006d5cebc20dbd0adcb2009126370f78a729cadb80ea633b7541ba4e66247"}, 0x10) 18:41:55 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket(0x5, 0x80007, 0x4) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000080)={{0x100, 0x2}, 0x1}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) [ 505.408125] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 505.415427] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 505.422732] R13: 00000000004cb950 R14: 00000000004c3307 R15: 0000000000000000 18:41:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x2, 0x0) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000040)=0x4, 0x4) 18:41:55 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)='/'}, 0x10) [ 505.622963] kernel msg: ebtables bug: please report to author: Wrong len argument 18:41:55 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:55 executing program 7 (fault-call:2 fault-nth:1): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:41:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x4}, 0x10) 18:41:55 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x10) 18:41:55 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000040)=0x10, 0x80000) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000540)=@broute={'broute\x00', 0x20, 0x2, 0x388, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000180], 0x0, &(0x7f0000000080), &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x9, 0x28, 0x4, 'bond_slave_1\x00', 'bond0\x00', 'team_slave_1\x00', 'yam0\x00', @link_local, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @dev={[], 0xe}, [0x0, 0xff, 0x0, 0xff, 0x0, 0xff], 0x70, 0xf8, 0x128}, [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3, 'syz0\x00', 0x1}}}, @common=@dnat={'dnat\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 0xffffffffffffffff}}}]}, @common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffc}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x8, 0x806, 'yam0\x00', 'syzkaller1\x00', 'gretap0\x00', 'rose0\x00', @remote, [0xff, 0xff, 0xff, 0xff, 0xff], @local, [0xff, 0x9513a0ce833a9a35, 0x0, 0x0, 0xff, 0xff], 0xb8, 0x180, 0x1d0, [@ip={'ip\x00', 0x20, {{@dev={0xac, 0x14, 0x14, 0x15}, @remote, 0x0, 0x0, 0xfffffffffffffffd, 0x89, 0x20, 0x2, 0x4e23, 0x4e22, 0x4e22, 0x4e21}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x0, 0x8, 0x1}}}, @common=@nflog={'nflog\x00', 0x50, {{0x1, 0x8, 0x681, 0x0, 0x0, "83a413e0a2b2cd79c545be0c5771ef1ca95fb4f3d3df701435e1f4e8f9f8c445d01d13e040ecbfe04d370f5ab9a416be1e1f72a838b2d58ef9a308b52c716b3d"}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x0, 0xd41e, 0x40}}}}]}]}, 0x400) [ 505.934390] FAULT_INJECTION: forcing a failure. [ 505.934390] name failslab, interval 1, probability 0, space 0, times 0 [ 505.945897] CPU: 0 PID: 22976 Comm: syz-executor7 Not tainted 4.19.0-rc1+ #42 [ 505.953213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 505.962613] Call Trace: [ 505.965285] dump_stack+0x14b/0x190 [ 505.969001] should_fail+0xa98/0xaa0 [ 505.972777] __should_failslab+0x278/0x2a0 [ 505.977099] should_failslab+0x29/0x70 [ 505.981066] __kmalloc+0xbe/0x350 18:41:56 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)='/'}, 0x10) [ 505.984586] ? __do_sys_bpf+0x8670/0xe860 [ 505.988828] __do_sys_bpf+0x8670/0xe860 [ 505.992915] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 505.998460] ? prepare_exit_to_usermode+0x13f/0x410 [ 506.003605] ? syscall_return_slowpath+0xdb/0x700 [ 506.008573] __se_sys_bpf+0x8e/0xa0 [ 506.012284] __x64_sys_bpf+0x4a/0x70 [ 506.016072] do_syscall_64+0xb8/0x100 [ 506.020017] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 506.025257] RIP: 0033:0x457099 [ 506.028534] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 506.047512] RSP: 002b:00007fc570d13c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 506.055330] RAX: ffffffffffffffda RBX: 00007fc570d146d4 RCX: 0000000000457099 [ 506.062698] RDX: 0000000000000020 RSI: 0000000020000200 RDI: 0000000000000002 [ 506.070042] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 506.077382] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 18:41:56 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x1f, 0x280000) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000340)={0x0, 0x3, 0x9, 0x4, 0x8, 0x7, 0x1808, 0x1, {0x0, @in={{0x2, 0x4e23, @local}}, 0x1, 0x1, 0xb5d5, 0x8}}, &(0x7f0000000180)=0xb0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={r2, 0x3}, 0x8) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:56 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) io_setup(0x9, &(0x7f0000000000)=0x0) io_cancel(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xa, 0x3, r0, &(0x7f0000000240)="5a343205a1cf83da5b64f3acb6a8c6c66d049ee3bc1166cd1d1b67beadedb5f911c43e6dfce508e2d32b52a2ef420d7dee9326836ca289a0d061bf0bd9d11ee22c0ac23401d5e861f55298afbb6a55411907f661a5647743b41bbfc76ba21bbce08242fe21b22282328ed86aad2a183b13b2cbd0eb7d20ee5eae30effcb8db7c9a69a16fa258f869daf3008b7e85060bda", 0x91, 0x0, 0x0, 0x2, r0}, &(0x7f0000000080)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x101000, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000180), &(0x7f00000001c0)=0x14) [ 506.084712] R13: 00000000004cb950 R14: 00000000004c3307 R15: 0000000000000001 18:41:56 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)='/'}, 0x10) 18:41:56 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000040)=0x1e) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) 18:41:56 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x10) 18:41:56 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) socketpair(0x4, 0x0, 0xd0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x9}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={r2, @in={{0x2, 0x4e24, @multicast2}}}, &(0x7f0000000100)=0x84) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:56 executing program 7 (fault-call:2 fault-nth:2): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:41:56 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) uselib(&(0x7f0000000080)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:56 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x2b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f00000000c0), &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x330) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x103d80) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0x9c4}, 0x4) 18:41:56 executing program 0 (fault-call:3 fault-nth:0): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) [ 506.907155] kernel msg: ebtables bug: please report to author: bad policy [ 506.973038] kernel msg: ebtables bug: please report to author: bad policy [ 506.992315] FAULT_INJECTION: forcing a failure. [ 506.992315] name failslab, interval 1, probability 0, space 0, times 0 [ 507.003992] CPU: 0 PID: 23035 Comm: syz-executor0 Not tainted 4.19.0-rc1+ #42 [ 507.011350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 507.020789] Call Trace: 18:41:57 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:57 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x10) 18:41:57 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cfe9c65120b091f412cdfd9f58"}, 0x10) 18:41:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x34e) open$dir(&(0x7f0000000000)='./file0\x00', 0x2000, 0x80) [ 507.023459] dump_stack+0x14b/0x190 [ 507.027192] should_fail+0xa98/0xaa0 [ 507.030986] __should_failslab+0x278/0x2a0 [ 507.035320] should_failslab+0x29/0x70 [ 507.039281] __kmalloc_track_caller+0x1f4/0xc60 [ 507.044116] ? __do_sys_bpf+0x4f1c/0xe860 [ 507.048361] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 507.053822] ? __fget_light+0x1f1/0x700 [ 507.057895] memdup_user+0x7c/0x1e0 [ 507.061642] __do_sys_bpf+0x4f1c/0xe860 [ 507.065732] ? __msan_metadata_ptr_for_store_4+0x13/0x20 18:41:57 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x6000, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000140)={@loopback, @multicast1, 0x0}, &(0x7f0000000180)=0xc) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r2, 0x1, 0x6, @link_local}, 0x10) unshare(0x20400) socketpair(0x0, 0x2, 0xfceb, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r3, 0x4008af22, &(0x7f0000000080)={0x0, r4}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) [ 507.071276] ? prepare_exit_to_usermode+0x13f/0x410 [ 507.076401] ? syscall_return_slowpath+0xdb/0x700 [ 507.081356] __se_sys_bpf+0x8e/0xa0 [ 507.085041] __x64_sys_bpf+0x4a/0x70 [ 507.088806] do_syscall_64+0xb8/0x100 [ 507.092666] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 507.097908] RIP: 0033:0x457099 [ 507.101148] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 18:41:57 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f74b76e6a4404bdf2bfdd260a5540ee6d6f64653d42303030303030302930303030301b30ff3030", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) [ 507.120145] RSP: 002b:00007f0a38659c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 507.127930] RAX: ffffffffffffffda RBX: 00007f0a3865a6d4 RCX: 0000000000457099 [ 507.135247] RDX: 0000000000000010 RSI: 0000000020000140 RDI: 0000000000000003 [ 507.142609] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 507.149925] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 507.157239] R13: 00000000004cb908 R14: 00000000004c32ca R15: 0000000000000000 18:41:57 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) socket$inet(0x2, 0x5, 0x3) socket$inet_udplite(0x2, 0x2, 0x88) 18:41:57 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x10) 18:41:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x5, 0x7, 0x8007, 0x1, 0x0, 0x1, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7fff, 0x509000) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x10001) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) modify_ldt$read_default(0x2, &(0x7f0000000240)=""/251, 0xfb) 18:41:57 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)='/'}, 0x10) 18:41:57 executing program 0 (fault-call:3 fault-nth:1): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:57 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x40000000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), &(0x7f0000000040)}, 0x20) 18:41:57 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x1, 0x1) 18:41:58 executing program 2: setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000080)=0x1, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x3be57958) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/253, 0xfd) poll(&(0x7f0000000100)=[{r0, 0x1000}, {r0, 0x8008}, {r0, 0x1130}], 0x3, 0x4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) [ 507.988898] IPVS: ftp: loaded support on port[0] = 21 18:41:58 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="18aa240800000013de00eeca720000000000000001ced27debeb05a800006d7e63f7694dac3b7e0cbb7d33eebc8adbcdc1f6e5fc2adbbb6cb4cd89e847692f4a0c6b12f9cc0609b79f802bb1da75210384a93ec3ac06815b9ca37ad7e0f3aa4ae67aa7bb2ef4f7febb0c0c595fe2d9ca7550bd6c4ece2276b5ef9d78376c0a6b7bd3eef376293d9604273668c374511e5b7106ab7ee98168ee5d724d7021380dbc6fc410e7ad88a4ec96278e92871059ca166d3652c4d5fd5d93a2ddbacd015513b366d973a8c3f0581788bfe702201a63d851d6e762bee30f09bdba7eb381aad4ee53dec67cf5564e2fe6e500fb4b5fa406b0af25819920439554f4cfc95ae71d1992b94f54a7e2f039cc3f08a6cd1dfef6469cd4c5414c95e461a650c4e9bdb8da78bd79893c7cc63f83fc986f0af98e477bbe6ac4e1337d414e13674e803e849abf438342f1a0d9c1d28cd135e6fc5f4bf8d825e799b0ab59a2b8cf76da9b17abd301980976c9498ab9f816b60b92b8889a7a8307d37877bd7b15b4104edb78e826951eaefe4a3d8fb02f1c198c7db9f7a182e35e18cc82ac9f2cf092b8463ff8bf1e683032e520b2bd8d1684a0be2cde0c4e21e33a75058be3d23ac8205433535078bf7e7d3139367f6967145386c179f8e92e7847210512ef2eae4cd56d34b7866d42749f1e0892902db200d54786c81ade2b11bfe7e2fb7e9e1b9ffb0af1ea61f786f82d2104dc55c22eea28829570645959cdee44c860c467aa6f0de5dc178af8cca80f7beeb185130327476fe6589fd684c76870ae768c38ab2cc6e172757e6d4f87b5f95196566e06a4e1bc9218a83486047cf258f1cbe3b975885e3d37b98f3cf74c468005626f1bf1945c085e5a355620a4548916adba564ae80f11f5e401ce7764ef5006d5cebc20dbd0adcb2009126370f78a729cadb80ea633b7541ba4e66247d0c3720195e60b36"}, 0x10) 18:41:58 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) prctl$setendian(0x14, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000400000000ffffffff0100000009000000000000006c616e3000000000000000000000007663616e30000000000000000000000079616d3000000000000000000000000065727370616e300000000000000000000180c200000000000000000000000000000000000000000000007000000070000000a00000007265646972cfc99986f1a987b5000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000cdf038400000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000fcffffff0100000003000000000000000000626f6e645f736c6176655f310000000069703667726574617030000000000000626f6e645f736c6176655f310000000076657468300000000000000000000000ffffffffffff0000000000000180c200000000000000000000087000000070000000a00000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000032322364025fb19566efddc048256d794eaa27b77307f2006c6a469c4c016c047b5324dfd13578b011e37f989a907e64d827f426c01128ce8e914d72017e90ba76af93e5d1e71fa1aff6ceb4768b1578c43ee42b9105c6f476ec1ccfab3975bfda73ab6e53c133afc862055b0618c026e141fbce7b16f183b64dc87246d2d6c95999613d4e515a85cf674d0ad768c05fc7b1d07f5d758adce3f3062c83cdc8e6660bc53eb9508145fc290614edc6d57795d9eca46a2ff01f5baf2f957413a98898a9a0f895590ac039fcc08c29e3"]}, 0x313) [ 508.283183] kernel msg: ebtables bug: please report to author: Wrong len argument 18:41:58 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:41:58 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)='/'}, 0x10) 18:41:58 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180), 0x1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) [ 508.329424] kernel msg: ebtables bug: please report to author: Wrong len argument 18:41:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x200000, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000240)={{0x1, 0xffffffffffffff72}, 'port0\x00', 0x21, 0x100000, 0x4, 0xd4, 0x100000000, 0x9c0a, 0x101, 0x0, 0x6, 0x400}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256\x00'}, 0x58) 18:41:58 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="e1464a1bc563f3903c232a76d1f963298672aee82ab54b96ff91bcbc7c659845e99f6d57dbb90cfe6779e3dd7a5954432823a154a9f57a1e8a1d5ee1fd4cb68a847c8c6076739ad4c8234d5ca5b2335c1b357080e2cb604034d3730ebb51468e99c8f57c0f2ff7060a60140f9e20ea1a0ff6cb2b266800cfe40434172a23c709afbc2b", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2cf8a9a1249cff09cceb9db5c3e4d47cea8202d505cde0b554473d5cb1cae55bb644dacd"]) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:41:58 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x10) 18:41:58 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x4, 0x498, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200008c0], 0x0, &(0x7f0000000000), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000090000000000000088f7766c616e3000000000000000000000007663616e30000000000000000000000079616d3000000000000000000000000065727370616e300000000000000000000180c200000000000000000000000009000000000000000000007000000070000000a000000072656469726563740000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff020000000b00000022000000e9ff736974300000000000000000000000007465616d5f736c6176655f31000000006772657461703000000000000000000076657468315f746f5f62726964676500aaaaaaaaaabbffffff00ffff53e58599ef2e00ff0000ff000000e800000070010000c0010000697036000000000000000000000000000000000000000000000000000000000050000000000000000000000cfe8000000000000000000000000000bbffffff00000000ffff00000000000000000000ff530920b2ffffffffffffffff082f28114e204e234e204e22000000006d61726b000000000000000000000000000000000000000000000000000000001000000000000000e0ffffff00000000fcffffff0000000049444c4554494d455200000000000000000000000000000000000000000000002800000000000000ffff000073797a3000000000000000000000000000000000000000000000000001000000000000004c45440000000000000000000000000000000000000000000000000000000000280000000000000073797a310000000000000000000000000000000000000000000000012c1900000180ffffffffffff1b00000004000000fbfb76657468305f5f746f5f627269646765007465716c3000000000000000000000006272696467655f736c6176655f310000000000000000000000ffffff0180c2000000ff000000ff000000c0000000c00000000801000069707673000000000000000000000000000000000000000000000000000000002800000000000000fe8000000000000000000000000000aaffffffff00000000000000ff000000004e233f004e2208084552524f520000000000000000000000000000000000000000000000000000002000000000000000ef9fbdb30b10bbf225a90cadc831eac3d0c9ff14130b64f410d9c705c0b4000000000000000000000000000000000000000000000000000000000000000000000000000003000000fcffffff010000000300000000000000fffc626f6e645f736c6176655f310000000069700600000074617030000000000000626f6e645f736c6176655f310000000076657468300000000000000000000000ffffffffffff0002000000000180c200000000000000000000007000000070000000a00000004e4651554555450000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000fa9d5acc61ea2990961aac560a1a27c9b7167a6dc8125731845a29c60e4291286867273705a6c22cb07de69215c2320f66749d6ed098614adf82560fd083e406594cfc763e526a121507e731b5857df2752c3794bbba2b50f1434ffe09b773022e175842282d702eb7c794011c2eaddc3c13758e77ff9c1e580ad8ccf7ffbdd35ac7a408bfed851ecdb13b344aadbe2b9c0b6639a2d3c1a3004883d69ea5b35fc453095a876a2f7c585db7374bb137049831250885aafed49adb417c1f98084c5da8224a2450743a4c2e9241c747e1687dae90f9024020bf34769f8f976253f999a453226467b613bcf9f8b2d60f1280e57d2abd7ecd50158f3cfad28fe336484f16bf899e9a9d4829294b0db8c5b97cded81f5263b82be2ecaf57b37965ab288c1924f8a870be220c281f"]}, 0x62c) 18:41:58 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000040)={r1, 0x1, 0x6, @random="173596b70042"}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:41:58 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)='/'}, 0x10) [ 508.737958] IPVS: ftp: loaded support on port[0] = 21 [ 508.800739] kernel msg: ebtables bug: please report to author: Wrong len argument 18:41:58 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0x158, r2, 0x300, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x60, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@loopback}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xff}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4b4a28d2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x10000}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xfff}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'yam0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}]}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4b}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x20}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xae}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3f}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x80000001}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x20}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x401}]}, 0x158}, 0x1, 0x0, 0x0, 0xc4}, 0x1) 18:41:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000000)="5acc07d7a8", &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) [ 508.882221] kernel msg: ebtables bug: please report to author: Wrong len argument 18:42:00 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x6}, 0x2c) unshare(0x20000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r1 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0xe31, 0x100) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000280)=0x24) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='\x00', 0xffffffffffffff9c}, 0x10) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f00000001c0)) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000180)=0xab7) sendmsg$nl_generic(r2, &(0x7f00000026c0)={&(0x7f0000002700)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001400)={&(0x7f0000001480)={0x119c, 0x15, 0x620, 0x70bd2a, 0x25dfdbfb, {0xc}, [@generic="b1036be2d8a5c53ba6262e3fe1ba0e30499d68df0ed1d30eccae7265587b36b96a4e71f4bc69b9a1a846b0dc51acfb850f33f7c8a8bdc3d2e1b70230edd0b6b4202c5e0660f8faa11eeb7696bb01ad38357f4756f3df8ced8bbdea2e122554827119b658d6c8974433478a635dfa65142a46d7d529415a8dd7081ece2d0d9db79fa48360", @typed={0xc, 0x90, @u64=0x20}, @nested={0x8c, 0x2d, [@generic="1c7c327bfa3bd6144e97bc91bb2da9a79ef7a580cfe9b03d08b099fe9e8abbc5b8c0e227dee2eaec29d03e3d0d220badb054d7293ee11ac48ad248fc219b7a75e3dfd80071d7f28cad6d9d6a7ccd", @generic="ff191ca40205d88472387b342d93d093c454360925422e0066d694e942f9d1ffca10f7e216d1b3e02a667c9f9aa7", @typed={0x4, 0x1}, @typed={0x8, 0x57, @str='\x00'}]}, @nested={0x106c, 0x1c, [@generic="18925f32d38a1aabfa1ec1d50cb2f90e60153a094c8c0315f34d658d6f59047ec90e9286113d0f3d506a15ff5636a31558c9e89992bc1c4f9d23492e11efc4133b2de143d132c571452786e17dcdb79b7b9b0ac5cdd70bfd28b86fd9c72bc5368c", @typed={0x1004, 0x8e, @binary="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"}]}]}, 0x119c}, 0x1, 0x0, 0x0, 0x40000}, 0x24044040) flistxattr(r2, &(0x7f00000002c0)=""/91, 0x5b) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000340)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000000)="7641edc401a7ffaafe607118ca5666fa3616518ae3ae7b5e83d8bcfce5ecefe4551b227a710937fb68b97173288379f5bd6769385b651820837fd06337baee10d125034afbfb730a9053223b59595a9a9619bb2091"}, 0x10) socket$kcm(0x29, 0x5, 0x0) 18:42:00 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x100) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:42:00 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x20000) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x3, 0x7b3d5cf6}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@sack_info={r1, 0x2, 0x2}, 0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r2, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r2, &(0x7f0000000080)}, 0x10) 18:42:00 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000009000000000000000000766c616e3000000000000000000000007663616e30000000000000000000000079616d30000000000000000073a9000065727370616e300000000000000000000180c200000000000000000000000000000000000000000000007000000070000000a000000072656469726563740000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000fcffffff0100000003000000000000000000626f6e645f736c6176655f310000000069703667726574617030000000000000626f6e645f736c6176655f310000000076657468300000000000000000000000ffffffffffff0000000000000180c200000000000000000000007000000070000000a00000004e4651554555450000000000000000000000000000000000000000000000000008000000000000000000000000000000"]}, 0x248) fstat(r0, &(0x7f0000000000)) 18:42:00 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cfe9c65120"}, 0x10) 18:42:00 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x8000, 0xe6179fb4ccad3666) r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) mkdirat(r0, &(0x7f00000003c0)='./file1\x00', 0xffffffffffffffff) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x82, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000001000), 0x1000) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000001c0)={0x0, 0x7, 0x9, [0x6, 0x3, 0x101, 0x588, 0x2, 0x5, 0x1, 0x6, 0x0]}, &(0x7f00000002c0)=0x1a) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000340)={r3, 0xfffffffffffffffb, 0x1, [0x7]}, 0xa) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x4) read$FUSE(r1, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:42:00 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x10) 18:42:00 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) 18:42:00 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) socketpair(0x2, 0x800, 0x9, &(0x7f0000000000)) 18:42:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) socket$netlink(0x10, 0x3, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2, r1) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xfffffcae) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000380), &(0x7f00000003c0)=0x4) recvfrom$packet(r2, &(0x7f0000000240)=""/53, 0x35, 0x10000, &(0x7f0000000580)={0x11, 0xc, r3, 0x1, 0x40, 0x6, @dev={[], 0x15}}, 0x14) r4 = syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x9, 0x0) r5 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="38000000bf0a00bdf9841a204aabd307418e0ae8b01e1d36f0a8d6a869c270f1ae06d47f471d122d8096e6feefe890bc6d058942bb5a1499e76009e6ec22569c9836cb4d19c988839c6cdb90c9a96c2b37e69174199bf67b6c75888047b33c", @ANYRES16=r5, @ANYBLOB="000429bd0000000c000300101e0000000000000c00040069000000000000000c0001f7ff01000000000000"], 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x4040) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r4, 0x84, 0x1c, &(0x7f0000000400), &(0x7f0000000440)=0x4) ioctl$VT_GETMODE(r4, 0x5601, &(0x7f0000000340)) 18:42:00 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x4b00) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:42:00 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x10) 18:42:00 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socketpair(0x13, 0x3, 0xcfba, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000080), 0x2) read$FUSE(r1, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:42:00 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)='/;'}, 0x10) 18:42:00 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x40000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:42:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0}, 0x10) 18:42:01 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x3, 0x9, 0xfffffffffffff7ff, 0x4}, 0x2c) unshare(0x20400) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40000, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2c000000000002000000000000000b0000002d7c5f1d586e000000002f6465762f68000000000000000000000067769e59994ce31dc976bc0b54168906a4113b3b8b6f64dd318a54c92f9d73dba2630843ba1fb17a1420549ea01d6c0575be0f4912bea1a68224cc3be6880c517c3fb64e5acb0af2483a55eafdbaf2c8c6337c579cee058ad85a4cb24d71940551c19629a4618f27f26f13120338c0625a36bdf6c5a883a2dc"], 0x2c) bind$can_raw(r1, &(0x7f0000000040), 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) getegid() getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) 18:42:01 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001300)={r0, &(0x7f0000000180)="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"}, 0x10) 18:42:01 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x60}) 18:42:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f0000000240)=ANY=[@ANYBLOB="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"]}, 0x2cc) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x80, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f0000000180)={0x3, {{0xa, 0x4e21, 0x2, @dev={0xfe, 0x80, [], 0x16}, 0x4}}}, 0x88) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000040)=0x2, 0x4) 18:42:01 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)='/;'}, 0x10) 18:42:01 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="666454a4579543c230dbc8457208127f3d", @ANYRESHEX=r0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read(r0, &(0x7f0000000240)=""/142, 0x8e) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f00000000c0)) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) [ 511.317954] kernel msg: ebtables bug: please report to author: Wrong len argument 18:42:01 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) [ 511.403026] kernel msg: ebtables bug: please report to author: Wrong len argument 18:42:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80002, 0x80) pwrite64(r0, &(0x7f0000000040)="b1117341f28d9588", 0x8, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000080)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r1, &(0x7f0000000240)="ddd1d16c0db4b4ce176260df4ab38d622a3a002fd09a9644973652e8fd732b623c828b82c24d0ceb3bdafdffc70562", &(0x7f0000000280)="0b57ed616a2f9aa9908c87aa78ac4a1f128af55c9f1c99a73edeba2c45f30f7a32ee5fc1c7b1545fd92f1ae25b3f38269442397bf056eb60dcefa6211f0de1ef3f99c03d76f87bc6e13b767d196d17dcf9c19f5949d8283249ca05c42c11bde78638aa855bdb02ee090d674000e0dae1e7fa48af782996835d250824abfb2c58", 0x2}, 0x20) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x4e23, @loopback}}, 0x5, 0x100000001, 0x1bc, "5b542d6c131c0004662a214425e75e294460c85c8f5f6bdc6063e2c8ae91be5c50854e9fbdeebfe0b226e6fb0c1885a60ef34f1a1f69c7a51910893d3bf17fac099275d2e0428959cf89b97b2c69e55b"}, 0xd8) 18:42:01 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x401) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000000)="5215d852b63cb2e9d07b8bc05ec51a1d48eb867086f2f35f8485a30fbf", &(0x7f0000000180)}, 0x20) 18:42:01 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socketpair(0x13, 0x3, 0xcfba, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000080), 0x2) read$FUSE(r1, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:42:01 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x8000900) vmsplice(r0, &(0x7f0000000640)=[{&(0x7f0000000340)="ef616b379322eed558a505d5", 0xc}, {&(0x7f0000000380)="dca1c69e5c2a8fb1f00d828bd98653e632ff5589e232eadf49f6732e27d044c7161c60da345d154c419484d89b39eb7fad27f9e36e006e14e8d56ced87d88d12e42f4fada8efece95b76da3a51044fd193f9e81247392af648ee98f5af5d3868161d", 0x62}, {&(0x7f00000005c0)="b3c8b9ab61c20391bbac4d4530224227e860ffa8adf5f5af0ee332531a6a1a95e2262800cba54b4d56192279e3fa7c9c7d31c2aa998c41216f273e4059c1c8212cdc", 0x42}, {&(0x7f00000008c0)="03caf7dc545d5d62234ef93a61d2f35e41c7638b6f86af0461904231e06403e1f4a0d6517f1a8e717795f2d268f3813fd4df8882ac38ad292084e1384c16f46d249060183bb089e666353f2fe7cbf7c2e315a1a6008759851b70eacbea37364af69f686cef1603af664c2cabd803a47709536885aa9e01c9fe79b98d8f8f5901e142ae9bdd6e82043bba0b3e7f087aab95597905bee157", 0x97}], 0x4, 0x8) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000580)='/dev/hwrng\x00', 0x2000, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, &(0x7f0000000400)=""/164) r2 = add_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000100)="60fd0416eb6e31992b5ce48b934a4bd730edb3b183ec472ee9e0aa1e47600cb08421b75242240a8683f0225683de41317e625fd6cb85d408722ef8ce43b2794d03727e1abcc2dd20901b", 0x4a, 0xfffffffffffffffd) keyctl$setperm(0x5, r2, 0x10000005) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0}, 0x10) r3 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0xffffffffffffffd1, 0x1) keyctl$get_security(0x11, r2, &(0x7f00000009c0)=""/10, 0xfffffff8) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000300)={'vcan0\x00', {0x2, 0x4e22, @local}}) uname(&(0x7f00000004c0)=""/133) mount$fuse(0x0, &(0x7f0000000cc0)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x2080000, &(0x7f00000006c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYPTR=&(0x7f0000000c40)=ANY=[@ANYPTR=&(0x7f0000000bc0)=ANY=[@ANYBLOB="00369a74df47812c001ffdb74571d79b183b943695759bc151c26667702dc5be25f242505e9d9e8968e8261493228542659bb954", @ANYRES16=r1], @ANYRES64=r3, @ANYRESOCT, @ANYPTR=&(0x7f0000000c00)=ANY=[@ANYRES32=r3], @ANYRES64=r0, @ANYRES32=r2, @ANYRESOCT=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRESDEC=r2], @ANYRESDEC, @ANYBLOB="2c67726f75705f694c3db829b345b3d0c011d579b1737b8cacf056695864bde18639265ee190597ba061d89e3e1337a9111a22b65bc6c27a1602e09780c2afcab9e500ca1457dab6223cb8e7b83c04eb0fe0454a0f09c5bcc35ae9c5ca8c381ee3d7645fa4efe593fe004f6ca8ee44e9d4f8ce2cb515989b0a2be57cb8b189595817c597e6343428a90ca6", @ANYRESDEC, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c6d61785f726561643d3078303030303030303030303030303030352c626c6b73697a653d3078303030303070303030303030313230302c6d61785f726561643d307830303030303030303030303030306d697373696f6e732c64656661756c745f7065726d697373696f6e732c616c6c6f775f6f746865722c616c6c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c626c6b73697a653d3078303030303030303030303030303230302c00000000000000891d240000000000"]) r4 = semget(0x3, 0x2, 0x100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000a00)=ANY=[@ANYRES32=0x0, @ANYBLOB="ba0000007b4ae8da8690986622e835a755656148befbc97d64a581131723d458c1178dd5cb3d1c6cfc9923916af5f96d4e3475f3135ccdb6588cfb71a4bad7ad6e37759ebec29cd8be79ff0b5f6a1f1dd6064850db24fc308a1d386f5069852b1b7038f7748c994583682fad732307fb155c164d4f141231a85ea7d0f47bf6423a551e238c3020c015e9439a01ba418d537049ffdcdc08985f6ad55c839d70daa9c27bef1bdf318f38b75f02dbbaaee5c56d9ac29acad100000000000000"], &(0x7f0000000680)=0xc2) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000b00)={r5, @in6={{0xa, 0x4e21, 0x3f, @dev={0xfe, 0x80, [], 0xa}, 0x8}}, 0xa4cb, 0x6, 0x8, 0x0, 0xffffffff}, &(0x7f0000000980)=0x98) semctl$IPC_STAT(r4, 0x0, 0x2, &(0x7f0000000280)=""/86) 18:42:01 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)='/;'}, 0x10) 18:42:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000a40)=@broute={'broute\x00', 0x20, 0x2, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f0000000940), &(0x7f0000000980)=ANY=[@ANYPTR=&(0x7f0000000900)=ANY=[@ANYPTR64, @ANYRESHEX=0x0]]}, 0x80) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), r1, 0x101}}, 0x18) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x2, 0x1) 18:42:01 executing program 5: r0 = socket$bt_rfcomm(0x1f, 0x1, 0x3) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000540)=""/178, 0xb2}, {&(0x7f0000000600)=""/213, 0xd5}, {&(0x7f0000000700)=""/136, 0x88}, {&(0x7f00000007c0)=""/204, 0xcc}], 0x4) syz_open_dev$dspn(&(0x7f00000002c0)='/dev/dsp#\x00', 0x9, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rfkill\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0xc0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d30303030303000040000303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r2, &(0x7f00000030c0), 0x1000) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x80, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f00000000c0)) setsockopt$inet6_MCAST_LEAVE_GROUP(r3, 0x29, 0x2d, &(0x7f0000000340)={0xc34, {{0xa, 0x4e20, 0x8001, @mcast1, 0xfff}}}, 0x88) mq_unlink(&(0x7f0000000180)='/dev/dsp\x00') write$FUSE_INTERRUPT(r2, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) lookup_dcookie(0x20, &(0x7f0000000400)=""/70, 0x46) 18:42:01 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x8000000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) [ 511.906778] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 18:42:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x400000000000005, 0x9, 0xff, 0x3ff, 0x9, 0xffffffffffffffff, 0xc}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1, 0x9c401) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000100)}, 0x10f) [ 512.000706] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 18:42:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80002, 0x80) pwrite64(r0, &(0x7f0000000040)="b1117341f28d9588", 0x8, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000080)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r1, &(0x7f0000000240)="ddd1d16c0db4b4ce176260df4ab38d622a3a002fd09a9644973652e8fd732b623c828b82c24d0ceb3bdafdffc70562", &(0x7f0000000280)="0b57ed616a2f9aa9908c87aa78ac4a1f128af55c9f1c99a73edeba2c45f30f7a32ee5fc1c7b1545fd92f1ae25b3f38269442397bf056eb60dcefa6211f0de1ef3f99c03d76f87bc6e13b767d196d17dcf9c19f5949d8283249ca05c42c11bde78638aa855bdb02ee090d674000e0dae1e7fa48af782996835d250824abfb2c58", 0x2}, 0x20) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x4e23, @loopback}}, 0x5, 0x100000001, 0x1bc, "5b542d6c131c0004662a214425e75e294460c85c8f5f6bdc6063e2c8ae91be5c50854e9fbdeebfe0b226e6fb0c1885a60ef34f1a1f69c7a51910893d3bf17fac099275d2e0428959cf89b97b2c69e55b"}, 0xd8) 18:42:02 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x2, 0x0) r2 = fcntl$getown(r0, 0x9) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000340)={{0x3, 0x2, 0x100000001, 0x3, 0x7fffffff}, 0x7e62e727, 0x3, 'id1\x00', 'timer0\x00', 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x40}) sched_getscheduler(r2) recvfrom$unix(r1, &(0x7f0000000240)=""/196, 0xc4, 0x10000, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e24}, 0x6e) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x4, 0xf6d, 0x8, 0x4, r0, 0x2}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:42:02 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cf"}, 0x10) 18:42:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d30303030303030303030713030303030303fc9ee51a5a562eb000000795c8e38733169fa46b0376e554784ac4832c5824cebbb0b4086213221d1934297c72a7860dcdac8fbb52de66c4a607f36", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = getpgrp(0x0) fcntl$setown(r0, 0x8, r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x150) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f00000002c0)=r1) 18:42:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x2e3) [ 512.294942] Unknown ioctl -1057467389 18:42:02 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e21}}) unshare(0x20400) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x400, 0x0) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000080)={0x80, 0x10001, 0x3f, 0x0, 0x4, 0x5, 0x3, 0xffffffffffffffff, 0x3f847dbb, 0x8, 0x5d, 0x40}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000100)={'bridge_slave_1\x00', {0x2, 0x4e22, @remote}}) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f0000000180)={{0x3f, @broadcast, 0x4e23, 0x0, 'lblc\x00', 0x1, 0xffffffff, 0x3b}, {@remote, 0x4e23, 0x2000, 0x6, 0x1, 0x100000000}}, 0x44) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) [ 512.350140] Unknown ioctl 21382 [ 512.426547] Unknown ioctl -1057467389 18:42:02 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100), &(0x7f0000000180), 0x1}, 0x20) r1 = dup3(r0, r0, 0x80000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000400)={0x0, 0xfffffe36, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106, 0x1009}}, 0xffffffffffffff47) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000100)={0x13, 0x10, 0xfa00, {&(0x7f0000000180), r2, 0x1}}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:42:02 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x90) [ 512.459886] Unknown ioctl 21382 [ 512.477735] kernel msg: ebtables bug: please report to author: Wrong len argument 18:42:02 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cf"}, 0x10) 18:42:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80002, 0x80) pwrite64(r0, &(0x7f0000000040)="b1117341f28d9588", 0x8, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000080)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r1, &(0x7f0000000240)="ddd1d16c0db4b4ce176260df4ab38d622a3a002fd09a9644973652e8fd732b623c828b82c24d0ceb3bdafdffc70562", &(0x7f0000000280)="0b57ed616a2f9aa9908c87aa78ac4a1f128af55c9f1c99a73edeba2c45f30f7a32ee5fc1c7b1545fd92f1ae25b3f38269442397bf056eb60dcefa6211f0de1ef3f99c03d76f87bc6e13b767d196d17dcf9c19f5949d8283249ca05c42c11bde78638aa855bdb02ee090d674000e0dae1e7fa48af782996835d250824abfb2c58", 0x2}, 0x20) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x4e23, @loopback}}, 0x5, 0x100000001, 0x1bc, "5b542d6c131c0004662a214425e75e294460c85c8f5f6bdc6063e2c8ae91be5c50854e9fbdeebfe0b226e6fb0c1885a60ef34f1a1f69c7a51910893d3bf17fac099275d2e0428959cf89b97b2c69e55b"}, 0xd8) 18:42:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = shmget$private(0x0, 0x4000, 0x54000208, &(0x7f0000ffc000/0x4000)=nil) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000480)=0x0) r3 = getegid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@dev, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) r5 = dup2(r0, r0) ioctl$VT_SETMODE(r5, 0x5602, &(0x7f0000000740)={0x3, 0x2, 0xff, 0x3f, 0x400}) getgroups(0x5, &(0x7f0000000600)=[0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff]) r7 = getpid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640)={0x0}, &(0x7f0000000680)=0xc) shmctl$IPC_SET(r1, 0x1, &(0x7f00000006c0)={{0x4, r2, r3, r4, r6, 0x0, 0x6}, 0x6, 0x4, 0x8, 0x100, r7, r8, 0x5}) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x360) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) 18:42:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) write$binfmt_misc(r0, &(0x7f0000000340)={'syz1', "c61df459ad3187866d8bcd83cc7ad6e965a9e23102bde622eb80cd106a0efd5d310e75c02d3b72273bdace5e310777b513c57c2831ec4b0fe6c761b586db9a52283f73a79e2e88cd7e2fbf0b3f78da6a590cb95d3757aca90a6f76841387b660b7c8a05beec46e636a9e0e14b72daad530206aa9371ba997292129c4e0e6d3c6b2f67ac846a7a1608c16ebce2f15518432972dae739a90e3edff993379b8bb1fd69dc1b801b1b977c2bcf86d54dee323052aa63d36bcd0c25f46fbee846f01d9"}, 0xc4) 18:42:02 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xe, 0x9, 0x7, 0x4, 0x0, 0xffffffffffffffff, 0x10001}, 0xffffffffffffff6c) unshare(0x100) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:42:02 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x100, 0x0) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000040)=0x5) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x200000, 0x0) 18:42:02 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) move_pages(r1, 0x3, &(0x7f0000000040)=[&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil], &(0x7f0000000180)=[0x7, 0x6, 0x1dea], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x6) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000200)="d7b0a1d48ed9a7520b2189", &(0x7f0000000240)="192b0a98e54d2cdd9a6f18ec1604e84a145f071c325b7deac26c0c8afab2feb45ae2394fb94519437de55f1ee633bef70878bd94aaf79f3caca8d650f27b71e39d1d23b9a2dbbc091be5c0fac08edb90b857f828cf4d11cf92a06d6d360a2eab0065d92a7f77ce33c5cc1ede2cca127264c4947fff2e486e481fce81773737b1aab8eb105e6017649da93b6a3a37f93c22ad30074a31d95eade0e54e120ee283c1229576e918f1b66dc1930ac8d8d8a3ca47a0053137ff", 0x200000000}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) [ 512.865917] kernel msg: ebtables bug: please report to author: Wrong len argument [ 512.914540] kernel msg: ebtables bug: please report to author: Wrong len argument 18:42:03 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cf"}, 0x10) 18:42:03 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) socket$bt_rfcomm(0x1f, 0x3, 0x3) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:42:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80002, 0x80) pwrite64(r0, &(0x7f0000000040)="b1117341f28d9588", 0x8, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000080)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r1, &(0x7f0000000240)="ddd1d16c0db4b4ce176260df4ab38d622a3a002fd09a9644973652e8fd732b623c828b82c24d0ceb3bdafdffc70562", &(0x7f0000000280)="0b57ed616a2f9aa9908c87aa78ac4a1f128af55c9f1c99a73edeba2c45f30f7a32ee5fc1c7b1545fd92f1ae25b3f38269442397bf056eb60dcefa6211f0de1ef3f99c03d76f87bc6e13b767d196d17dcf9c19f5949d8283249ca05c42c11bde78638aa855bdb02ee090d674000e0dae1e7fa48af782996835d250824abfb2c58", 0x2}, 0x20) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x4e23, @loopback}}, 0x5, 0x100000001, 0x1bc, "5b542d6c131c0004662a214425e75e294460c85c8f5f6bdc6063e2c8ae91be5c50854e9fbdeebfe0b226e6fb0c1885a60ef34f1a1f69c7a51910893d3bf17fac099275d2e0428959cf89b97b2c69e55b"}, 0xd8) 18:42:03 executing program 1: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3, 0x40000) getsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000c80), &(0x7f0000000cc0)=0x4) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000008c0)={0x7, 0x0, [{0xf000, 0x42, &(0x7f0000000040)=""/66}, {0x106002, 0xf4, &(0x7f0000000180)=""/244}, {0x0, 0x5, &(0x7f0000000280)=""/242}, {0xd000, 0xae, &(0x7f0000000380)=""/174}, {0x13000, 0xb8, &(0x7f0000000440)=""/184}, {0x7000, 0x8c, &(0x7f0000000600)=""/140}, {0x1f004, 0x9, &(0x7f00000005c0)=""/35}]}) r1 = request_key(&(0x7f0000000500)='rxrpc\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000580)='redirect\x00', 0xfffffffffffffff9) r2 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000c40)='{(posix_acl_access\x00', 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r1, &(0x7f0000000b80)=[{&(0x7f00000009c0)="3a725f9d5e9ad5512da43e28912f27", 0xf}, {&(0x7f0000000a00)="af6c37bcef294e4c5d79d2d6ab3c4cc83b9605717f427198713d6209c6a91abab65b373e7d50cd195dbeb3fd9c764564c4bc0ffd7038b15531f28c7d6b04fee05585f1afb2aadb788a7791401322547c4ead56e1a0251b495bcebf3745417314910b504a3efbabbe565209a799ba478197e9248482dba0b72dd95178153cb146db591c8b801a0525a8bd13332914df78322c3dd9041f738c5fed253278518082dca0ec4ed9af26aa142ef8cfc37e60cc40fec11ab7e96800c518d1505d4d3928eeceb335ba9a702d10fec94153278d70c45d7454336d3546f04d0bba5a5788b46e658d4ace2e671abe6a98a54ac8", 0xee}, {&(0x7f0000000b00)="bede2bce31d490b92184839a9c5d208c7e", 0x11}, {&(0x7f0000000b40)="34f864c92fe180a17476db1a53e1f5a4723015f4ba8e8f92dd987490e06521a3f177bdd96ce48bb7638ba5a0c3785a2df8f6ba595906", 0x36}], 0x4, r2) 18:42:03 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x9, 0xa, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000040)="a573e957e201c4a58390769436aa5d10b2fda93abf6f5c500c87b1802aa18b136247a10f31af3a5a448c799a96ffa7dc0646e2b5276aadc2ad218e", &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0xfffffffffffffe89) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x2, 0x0, 0x2, 0x20, r0, 0x10000}, 0x2c) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x3f, 0x400) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f0000000180)) write$P9_RMKDIR(r1, &(0x7f0000000100)={0x14, 0x49, 0x2, {0x0, 0x4, 0x1}}, 0x14) 18:42:03 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x40000000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), &(0x7f0000000040)}, 0x20) 18:42:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='vd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000340)="8d744e2ff08d5217b19301509cbb24cb5a0d1d7ef39fb82c808c0d4f1a5577405e61f58e4b107e2d33be0056a9d0e12edfa6ddbd76dd0e63b19450b19640a3ddc0213bef293ba7d874bcc8466ce37e95a5e825b8c94f9228d62616c03d31b770641a7a8412bcddf265c0aae3de923de0a71ccb032404adf367b4ff779d3511012faf3402776d7d34d3ea0e6aa4719ff14e9794e1d7802962f65aa7c93aebbb20d66c84a1da87cadbb98c2d9630014dbf04e7dcc5c4b0ebb25a7a1153971d19134052b28c6a7034e2cb28a0feb35d0d98767e1e247b4e7e1ad37436dd9f0e9608f07e49c332df8a913a", 0xe9}, {&(0x7f0000000080)="f523a7497eb0a750466aa51d6e829cc8c1f8739fc28dbfdbbe4129d6225e0b070e173d3eeec74f9f7f195f2f6141d3ebddd400cc19a128a8eb0e80fb71af126ae46fd314e8c58648e667f4b535c991a0601a27e72b", 0x55}], 0x2, 0x0) [ 513.413850] IPVS: ftp: loaded support on port[0] = 21 18:42:03 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) clock_nanosleep(0x7, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000040)) 18:42:03 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3}, 0x90) 18:42:03 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cfe9c6"}, 0x10) 18:42:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000001c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000009000000000000000000766c616e3000000000000000000000007263616e30000000000000000000000079616d3000000000000000000000000065727370616e300000000000000000000180c200000000000000000000000000000000000000000000007000000070000000a000000072656469726563740000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000626f6e6469703667726574617030000000000000626f6e645f736c6176655f310000000076657468300000000000000000000000ffffffffffff0000000000000180c200000000000000000000007000000070000000a00000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000c8402f3d8c53b60e231869e3695d306414429c2360a829a7d152121b1eddac"]}, 0x25b) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000180)={0x10, 0x0, 0x3}, 0x10) ioctl$sock_ifreq(r0, 0x89ff, &(0x7f0000000040)={'ip6_vti0\x00', @ifru_data=&(0x7f0000000000)="2269339ade4dfd0adb4d122667eb7445d1dab181cd7a675b59359b4cd6a31ec7"}) 18:42:03 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) fcntl$setpipe(r0, 0x407, 0x6) 18:42:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80002, 0x80) pwrite64(r0, &(0x7f0000000040)="b1117341f28d9588", 0x8, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000080)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r1, &(0x7f0000000240)="ddd1d16c0db4b4ce176260df4ab38d622a3a002fd09a9644973652e8fd732b623c828b82c24d0ceb3bdafdffc70562", &(0x7f0000000280)="0b57ed616a2f9aa9908c87aa78ac4a1f128af55c9f1c99a73edeba2c45f30f7a32ee5fc1c7b1545fd92f1ae25b3f38269442397bf056eb60dcefa6211f0de1ef3f99c03d76f87bc6e13b767d196d17dcf9c19f5949d8283249ca05c42c11bde78638aa855bdb02ee090d674000e0dae1e7fa48af782996835d250824abfb2c58", 0x2}, 0x20) [ 513.661382] kernel msg: ebtables bug: please report to author: Wrong len argument 18:42:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) [ 513.782089] kernel msg: ebtables bug: please report to author: Wrong len argument 18:42:03 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) r1 = open(&(0x7f0000000000)='./file0\x00', 0x101602, 0x44) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000040)={0x8}, 0x4) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000080)={0xa, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) ftruncate(r0, 0x1f) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498f46e9a57a4", &(0x7f0000000180), 0x6}, 0xc) 18:42:03 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cf"}, 0x10) 18:42:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80002, 0x80) pwrite64(r0, &(0x7f0000000040)="b1117341f28d9588", 0x8, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000080)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r1, &(0x7f0000000240)="ddd1d16c0db4b4ce176260df4ab38d622a3a002fd09a9644973652e8fd732b623c828b82c24d0ceb3bdafdffc70562", &(0x7f0000000280)="0b57ed616a2f9aa9908c87aa78ac4a1f128af55c9f1c99a73edeba2c45f30f7a32ee5fc1c7b1545fd92f1ae25b3f38269442397bf056eb60dcefa6211f0de1ef3f99c03d76f87bc6e13b767d196d17dcf9c19f5949d8283249ca05c42c11bde78638aa855bdb02ee090d674000e0dae1e7fa48af782996835d250824abfb2c58", 0x2}, 0x20) 18:42:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:42:04 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x5, 0x698, [0x200008c0, 0x0, 0x0, 0x200009c8, 0x20000d00], 0x0, &(0x7f0000000000), &(0x7f00000008c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xd, 0x36, 0x0, 'teql0\x00', 'sit0\x00', 'veth1_to_team\x00', 'sit0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0x0, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0xa0, 0xd8}, [@common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffb}}]}, @common=@dnat={'dnat\x00', 0x10, {{@random="921b7fed0e70", 0xfffffffffffffffc}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x2, [{{{0x11, 0x0, 0x8847, 'ip6tnl0\x00', 'veth0\x00', 'erspan0\x00', 'vlan0\x00', @random="7eadb1e9fa2d", [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], @broadcast, [0xff, 0x0, 0xff, 0x0, 0xff, 0xff], 0x138, 0x170, 0x1a8, [@pkttype={'pkttype\x00', 0x8, {{0x5, 0x1}}}, @physdev={'physdev\x00', 0x70, {{'tunl0\x00', {0xff}, 'bcsh0\x00', {}, 0x2, 0x11}}}]}, [@arpreply={'arpreply\x00', 0x10, {{@dev={[], 0x20}, 0xffffffffffffffff}}}]}, @arpreply={'arpreply\x00', 0x10, {{@remote, 0xfffffffffffffffe}}}}, {{{0x9, 0x5, 0xe83f, 'eql\x00', 'team0\x00', 'bridge0\x00', '\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @broadcast, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], 0x130, 0x130, 0x160, [@arp={'arp\x00', 0x38, {{0x30e, 0xcb6d, 0xb, @broadcast, 0x0, @remote, 0xffffff00, @remote, [0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff]}}}, @arp={'arp\x00', 0x38, {{0x320, 0x93f7, 0x1, @local, 0xff0000ff, @loopback, 0x0, @remote, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @remote, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x8, 0x10}}}]}}, @common=@STANDARD={'\x00', 0x8, {0xffffffffffffffff}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x2, [{{{0x13, 0x1, 0x88fc, 'ipddp0\x00', 'ifb0\x00', 'bcsf0\x00', 'vcan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, [0x0, 0x0, 0xff, 0xff], @dev={[], 0x80}, [0xff, 0x0, 0x0, 0x0, 0xff], 0xe0, 0xe0, 0x128, [@statistic={'statistic\x00', 0x18, {{0x1, 0x1, 0x5, 0x401, 0x2, 0x8}}}, @connlabel={'connlabel\x00', 0x8, {{0x1, 0x1}}}]}}, @common=@ERROR={'ERROR\x00', 0x20, {"7c7a52175482251d5d019f3c791aa462677a3fc90252c86408aebf00ff70"}}}, {{{0x19, 0x20, 0x886c, 'veth0_to_bridge\x00', 'nr0\x00', 'gre0\x00', '\x00', @empty, [0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], 0xd0, 0xd0, 0x100, [@connlabel={'connlabel\x00', 0x8, {{0xfffffffffffffffd, 0x1}}}, @m802_3={'802_3\x00', 0x8, {{0xfe, 0x3, 0x3}}}]}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x710) 18:42:04 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80002, 0x80) pwrite64(r0, &(0x7f0000000040)="b1117341f28d9588", 0x8, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000080)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r1, &(0x7f0000000240)="ddd1d16c0db4b4ce176260df4ab38d622a3a002fd09a9644973652e8fd732b623c828b82c24d0ceb3bdafdffc70562", &(0x7f0000000280)="0b57ed616a2f9aa9908c87aa78ac4a1f128af55c9f1c99a73edeba2c45f30f7a32ee5fc1c7b1545fd92f1ae25b3f38269442397bf056eb60dcefa6211f0de1ef3f99c03d76f87bc6e13b767d196d17dcf9c19f5949d8283249ca05c42c11bde78638aa855bdb02ee090d674000e0dae1e7fa48af782996835d250824abfb2c58", 0x2}, 0x20) 18:42:04 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:42:04 executing program 2 (fault-call:5 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3}, 0x90) 18:42:04 executing program 7: r0 = dup(0xffffffffffffff9c) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000000)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000080)}, 0x20) [ 514.291883] kernel msg: ebtables bug: please report to author: bad policy [ 514.370455] kernel msg: ebtables bug: please report to author: bad policy [ 514.433870] FAULT_INJECTION: forcing a failure. [ 514.433870] name failslab, interval 1, probability 0, space 0, times 0 [ 514.445323] CPU: 1 PID: 23424 Comm: syz-executor2 Not tainted 4.19.0-rc1+ #42 [ 514.452649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 514.462057] Call Trace: [ 514.464723] dump_stack+0x14b/0x190 [ 514.468417] should_fail+0xa98/0xaa0 [ 514.472198] __should_failslab+0x278/0x2a0 [ 514.476528] should_failslab+0x29/0x70 [ 514.480535] kmem_cache_alloc+0x127/0xb20 [ 514.484877] ? getname_flags+0x127/0xaa0 [ 514.489074] ? __schedule+0x680/0x760 [ 514.492983] getname_flags+0x127/0xaa0 [ 514.496948] ? do_mkdirat+0x66/0x670 [ 514.500728] ? __se_sys_mkdirat+0x92/0xb0 [ 514.504975] do_mkdirat+0xaa/0x670 [ 514.508618] __se_sys_mkdirat+0x92/0xb0 [ 514.512672] __x64_sys_mkdirat+0x4a/0x70 [ 514.516830] do_syscall_64+0xb8/0x100 [ 514.520718] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 514.525963] RIP: 0033:0x457099 [ 514.529214] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 514.548196] RSP: 002b:00007f08b706dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 514.555984] RAX: ffffffffffffffda RBX: 00007f08b706e6d4 RCX: 0000000000457099 [ 514.563321] RDX: 0000000000000000 RSI: 0000000020000500 RDI: ffffffffffffff9c [ 514.570661] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 18:42:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80002, 0x80) pwrite64(r0, &(0x7f0000000040)="b1117341f28d9588", 0x8, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r1, &(0x7f0000000240)="ddd1d16c0db4b4ce176260df4ab38d622a3a002fd09a9644973652e8fd732b623c828b82c24d0ceb3bdafdffc70562", &(0x7f0000000280)="0b57ed616a2f9aa9908c87aa78ac4a1f128af55c9f1c99a73edeba2c45f30f7a32ee5fc1c7b1545fd92f1ae25b3f38269442397bf056eb60dcefa6211f0de1ef3f99c03d76f87bc6e13b767d196d17dcf9c19f5949d8283249ca05c42c11bde78638aa855bdb02ee090d674000e0dae1e7fa48af782996835d250824abfb2c58", 0x2}, 0x20) 18:42:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x9, 0x7, 0x1}, 0x2c) unshare(0x50000103) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r0, &(0x7f00000000c0)="d7ca93c56777fdc7c1c91370f05e444886bf634c3f7dfad537073df1d1d96c48f1cefc252fcb4fe58493006dd7ecad0c4bcd3fa048313978ccc3a7ea35e3ec3300b6f41bbebdda5a7fc1524a735f540287bba0d23fe1a5e55b"}, 0xfffffffffffffe63) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) [ 514.577996] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 514.585327] R13: 00000000004d3090 R14: 00000000004c8107 R15: 0000000000000000 18:42:04 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cf"}, 0x10) 18:42:04 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/audio\x00', 0x7, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f00000004c0)={0x13, 0x10, 0xfa00, {&(0x7f00000008c0), r2, 0x2}}, 0x18) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e24, @multicast1}}, 0xfffffffffffffff1, 0x3, 0x7, 0x6, 0x94ac}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={r3, @in6={{0xa, 0x4e22, 0x5, @mcast1, 0x69}}, 0xffff, 0x1, 0x7ff, 0x7f, 0xb0}, &(0x7f0000000080)=0x98) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in=@multicast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) connect$can_bcm(r1, &(0x7f0000000480)={0x1d, r4}, 0x10) 18:42:04 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) r1 = open(&(0x7f0000000000)='./file0\x00', 0x101602, 0x44) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000040)={0x8}, 0x4) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000080)={0xa, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) ftruncate(r0, 0x1f) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498f46e9a57a4", &(0x7f0000000180), 0x6}, 0xc) 18:42:04 executing program 7: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) write$P9_RSTAT(r0, &(0x7f0000000040)={0x3c, 0x7d, 0x1, {0x0, 0x35, 0x2, 0x8000, {0x0, 0x1, 0x1}, 0x10000000, 0x5a, 0x0, 0x800, 0x1, '!', 0x1, ')'}}, 0x3c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xb, 0x100000000, 0x4, 0x9207, 0x2, 0xffffffffffffffff, 0xfa}, 0x2c) 18:42:04 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="00fb2b8fdf215e7d4e000052705c69643d6c0ad7394db638eeef2c851c23c577940f8c8ee58a29c0d3d86aab3539047158d460b32cc37246446a8b24d079606c44be9f35a2a693d337d024f736781c09f13081f25ab0b1eaf935fc532db85178cd84642ff2f3de2e1ee4c967ff05d11ca8eb4a736e82a557fde4f66503fd13c08487e2bf6c06925f006d0ac6a50214369ba218a591155ed4f78c8db73efa28fdadd7458f3243b1e1411cd15d9ae904ebc1b9dfa71a1f2763996b0a94b13d73a7beb4fdd2a9e4257f96b26258ab159c856aa71e981dd26cb9ec492171eafc5d86213baba5b76d56", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x12040, 0x0) syz_open_pts(r1, 0x400000) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f00000003c0)=""/214) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000340)={'filter\x00', 0x0, 0x0, 0x0, [], 0x0, &(0x7f0000000240)=[{}, {}]}, 0x78) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0xffffffffffffffda, 0x10000) r3 = getpgrp(0xffffffffffffffff) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000180)={{0x2c, @broadcast, 0x4e24, 0x2, 'wlc\x00', 0x1d, 0x6, 0x46}, {@dev={0xac, 0x14, 0x14, 0x1d}, 0x4e20, 0x3, 0xfffffffffffffffb, 0x4, 0xfffffffffffffffe}}, 0x44) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f00000000c0)=r3) 18:42:04 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x10080) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000180)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x5, 0x0, 0xffffffffffffffff, 0xca61}, 0x2c) ioctl$FICLONE(r0, 0x40049409, r1) clone(0x40008000, &(0x7f00000004c0), &(0x7f0000000480), &(0x7f0000000400), &(0x7f0000000440)) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f0000000080)}, 0x10) finit_module(r0, &(0x7f0000000100)='\x00', 0x5b83668ec64facd0) 18:42:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80002, 0x80) pwrite64(r0, &(0x7f0000000040)="b1117341f28d9588", 0x8, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r1, &(0x7f0000000240)="ddd1d16c0db4b4ce176260df4ab38d622a3a002fd09a9644973652e8fd732b623c828b82c24d0ceb3bdafdffc70562", &(0x7f0000000280)="0b57ed616a2f9aa9908c87aa78ac4a1f128af55c9f1c99a73edeba2c45f30f7a32ee5fc1c7b1545fd92f1ae25b3f38269442397bf056eb60dcefa6211f0de1ef3f99c03d76f87bc6e13b767d196d17dcf9c19f5949d8283249ca05c42c11bde78638aa855bdb02ee090d674000e0dae1e7fa48af782996835d250824abfb2c58", 0x2}, 0x20) 18:42:05 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) r1 = open(&(0x7f0000000000)='./file0\x00', 0x101602, 0x44) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000040)={0x8}, 0x4) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000080)={0xa, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) ftruncate(r0, 0x1f) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498f46e9a57a4", &(0x7f0000000180), 0x6}, 0xc) 18:42:05 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x81, 0x0) socket$inet(0x2, 0x7, 0x0) 18:42:05 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cf"}, 0x10) [ 515.309732] IPVS: ftp: loaded support on port[0] = 21 18:42:05 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:42:05 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) r1 = open(&(0x7f0000000000)='./file0\x00', 0x101602, 0x44) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000040)={0x8}, 0x4) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000080)={0xa, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) ftruncate(r0, 0x1f) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498f46e9a57a4", &(0x7f0000000180), 0x6}, 0xc) 18:42:05 executing program 2 (fault-call:5 fault-nth:1): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3}, 0x90) 18:42:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) pipe(&(0x7f00000000c0)) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) write$FUSE_WRITE(r0, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x7ff}}, 0x18) 18:42:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80002, 0x80) pwrite64(r0, &(0x7f0000000040)="b1117341f28d9588", 0x8, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000240)="ddd1d16c0db4b4ce176260df4ab38d622a3a002fd09a9644973652e8fd732b623c828b82c24d0ceb3bdafdffc70562", &(0x7f0000000280)="0b57ed616a2f9aa9908c87aa78ac4a1f128af55c9f1c99a73edeba2c45f30f7a32ee5fc1c7b1545fd92f1ae25b3f38269442397bf056eb60dcefa6211f0de1ef3f99c03d76f87bc6e13b767d196d17dcf9c19f5949d8283249ca05c42c11bde78638aa855bdb02ee090d674000e0dae1e7fa48af782996835d250824abfb2c58", 0x2}, 0x20) 18:42:05 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cfe9"}, 0x10) 18:42:05 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x18000, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000240)={0x0, 0x1, 0x40, 0x8, 0x2, 0x93d2, 0x3ff, 0x4, {0x0, @in6={{0xa, 0x4e23, 0x2, @local, 0x80000000}}, 0x81, 0x10000, 0x41d2798b, 0x49c7, 0x1}}, &(0x7f0000000300)=0xb0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000400)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000480)={0x10, 0x30, 0xfa00, {&(0x7f00000003c0), 0x4, {0xa, 0x4e22, 0x6, @remote, 0xfffffffffffffe00}, r2}}, 0x38) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000340)={r1, 0x1a, "c89e807c4822d3fe2f3c31c3986481ef9b9fb62f90d11cd948f0"}, &(0x7f0000000380)=0x22) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101800, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x6c, 0x9774, 0x3f}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000001c0)={r5, 0x9}, 0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x8000, 0x0) 18:42:05 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) r1 = open(&(0x7f0000000000)='./file0\x00', 0x101602, 0x44) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000040)={0x8}, 0x4) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000080)={0xa, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498f46e9a57a4", &(0x7f0000000180), 0x6}, 0xc) 18:42:05 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0xffffffffffffffc8) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) [ 515.898449] FAULT_INJECTION: forcing a failure. [ 515.898449] name failslab, interval 1, probability 0, space 0, times 0 [ 515.909991] CPU: 0 PID: 23501 Comm: syz-executor2 Not tainted 4.19.0-rc1+ #42 [ 515.917332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 515.926735] Call Trace: [ 515.929398] dump_stack+0x14b/0x190 [ 515.933083] should_fail+0xa98/0xaa0 [ 515.936865] __should_failslab+0x278/0x2a0 [ 515.941194] should_failslab+0x29/0x70 [ 515.945169] kmem_cache_alloc+0x127/0xb20 [ 515.947486] IPVS: ftp: loaded support on port[0] = 21 [ 515.949397] ? __d_alloc+0x98/0xe40 [ 515.949477] ? task_kmsan_context_state+0x5e/0x110 [ 515.949528] __d_alloc+0x98/0xe40 [ 515.966820] ? __msan_poison_alloca+0x173/0x1f0 [ 515.971552] ? __lookup_slow+0x185/0x730 [ 515.975678] d_alloc_parallel+0x191/0x2270 [ 515.979978] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 515.985388] ? lockref_get_not_dead+0x2f5/0x3a0 [ 515.990152] ? __lookup_slow+0x70/0x730 [ 515.994214] __lookup_slow+0x185/0x730 [ 515.998186] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 516.003654] walk_component+0x32f/0xb70 [ 516.007736] ? inode_permission+0x1d8/0x8a0 [ 516.012118] link_path_walk+0xb3e/0x2130 [ 516.016280] ? path_init+0x9b4/0x19c0 [ 516.020178] filename_parentat+0x2cc/0x1560 [ 516.024603] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 516.030038] filename_create+0x144/0xa90 [ 516.034199] ? getname_flags+0x5eb/0xaa0 [ 516.038367] do_mkdirat+0x10c/0x670 [ 516.042084] __se_sys_mkdirat+0x92/0xb0 [ 516.046119] __x64_sys_mkdirat+0x4a/0x70 [ 516.050232] do_syscall_64+0xb8/0x100 [ 516.054095] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 516.059336] RIP: 0033:0x457099 [ 516.062576] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 516.081525] RSP: 002b:00007f08b704cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 516.089312] RAX: ffffffffffffffda RBX: 00007f08b704d6d4 RCX: 0000000000457099 18:42:06 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000080)={0x7, 0x0, 0x2, 0x7730, "e67f0eb865d1153a474f68e21726252eef48b48179c4972bb580df77980971d0"}) socket$inet_udp(0x2, 0x2, 0x0) memfd_create(&(0x7f0000000180)='[\x00', 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000008c0)=@broute={'broute\x00', 0x20, 0x2, 0x208, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000240], 0x0, &(0x7f00000000c0), &(0x7f0000000240)=ANY=[@ANYBLOB="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"]}, 0x280) 18:42:06 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) ioctl$FICLONE(r1, 0x40049409, r1) [ 516.096629] RDX: 0000000000000000 RSI: 0000000020000500 RDI: ffffffffffffff9c [ 516.103947] RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000000 [ 516.111259] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 516.118595] R13: 00000000004d3090 R14: 00000000004c8107 R15: 0000000000000001 18:42:06 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)) getresgid(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000240)) getcwd(&(0x7f0000000280)=""/37, 0x25) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f00000002c0)={0x0, @dev={0xac, 0x14, 0x14, 0x1e}, 0x4e24, 0x2, 'nq\x00', 0x4, 0x1, 0x71}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:42:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80002, 0x80) pwrite64(r0, &(0x7f0000000040)="b1117341f28d9588", 0x8, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000240)="ddd1d16c0db4b4ce176260df4ab38d622a3a002fd09a9644973652e8fd732b623c828b82c24d0ceb3bdafdffc70562", &(0x7f0000000280)="0b57ed616a2f9aa9908c87aa78ac4a1f128af55c9f1c99a73edeba2c45f30f7a32ee5fc1c7b1545fd92f1ae25b3f38269442397bf056eb60dcefa6211f0de1ef3f99c03d76f87bc6e13b767d196d17dcf9c19f5949d8283249ca05c42c11bde78638aa855bdb02ee090d674000e0dae1e7fa48af782996835d250824abfb2c58", 0x2}, 0x20) 18:42:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x10800) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000040), 0x4) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000180)=0x0) prctl$setfpexc(0xc, 0x40000) r3 = geteuid() sendmsg$nl_netfilter(r1, &(0x7f0000000900)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000008c0)={&(0x7f00000001c0)={0x4dc, 0xf, 0x3, 0x400, 0x70bd27, 0x25dfdbfe, {0xc, 0x0, 0x7}, [@typed={0x8, 0x92, @u32=0xffffffffffffffe1}, @nested={0x2e0, 0x91, [@generic="c876d9c9e3a1e30352be51218d20e959cd62f4b7df9bc3bd13728fa3cce7cea8df110692071b3f15be6a9af8bc87584cc7414d560e00c585a9fd51e8f195bacd29edc72ade0113e5610e0b6a216454a147ccc9c4809c65c0ad6e8140419ae760cd1fea6c63100143c06964a0125f5e3bc66381ef0344bcdc1a1cc9a5d65dd2e97d0591d88d242f9b36ec528eb09741ba0ff9a29c1e17395cad990de77e210d2bc25adc52507f4dede6aacaddd25567e4f511b248fad8437644c641d2918a097946561cbcad87e97673a65956", @typed={0x4, 0xd}, @generic="77f9023331273512bde1cbfbbbbb7b63199f8d6c498272636143204df0fb42dd9ef5f8c0829fd362f6f1df2fd2269eba0186280b84d637eeb0b3b2912838b11f39b1ed8ae238bbe3b145fabfaf68ab500a602e04ef7c3983051aee5356b63a4a652c2d4d4a4c54623bc3f970b5f3768f81c09d44684a4f552354e892f41974dd805baba30a2ae4efeaae8cae742ee845d86c4f673f45b8f3dd3493c77138bc5e82fb425ce294cd6a1cd3d5290c253f3ecffb5282d4ccfe4e2afefa3c883d5ea27987b954d57f5737d8491af3c0702e72a0a13c228ff0", @typed={0x4, 0x39}, @typed={0x8, 0x19, @pid=r2}, @typed={0x4, 0x7d}, @generic="f11311afc57cf0d13d2f0c8e80605634908032e0a532754c2a5cbae4a45e740b1f33b5ef004f1d2368f73414a0ccdd034a918858ec8d845c49d5a75aca454b3f20048c370fa1426896247d831576a40ef7beccce488d1dc57e375437ea30ff49a9f81729f03aeced0636ff48169c318f3ce98e0ea07d77cc358c66bb411432f607583a50453b01fe69b47906ffe1c48bae6c9f2103d2b52ca7152e7845", @typed={0x80, 0x24, @binary="e6da48099e30ebdb6ae1597e265e0e30d389c97b709bf7dc503de35c4b93a87f06cd2900219e44d8d43e09c76241b16f0c87020942795c32470995e131a3e14b2dd5660138fc1c16690f19e31eca7ef29b4d310c1fbf82157f95996e64d9711bc5a949d2de146e43abd74dc0abbcadfb11de69f1676ad3b0d5"}, @typed={0x8, 0x32, @fd=r1}]}, @generic="4d4e96787c31d2e1a82ce23e8b305d7965ecc1042fb243262d97f4a51745af6a902062714025e6193b6bca56a4b8273386daf27a884aaba7bc52ea80d6aa4d91436af6e8126ccdd9e2e5c7b99f1b7992226f6cbbb4ad5a7ffe", @typed={0x8, 0x36, @fd=r0}, @generic='dt', @nested={0x164, 0x1f, [@typed={0x8, 0x50, @uid=r3}, @generic="5696a613279355f293279f64520e719ded8ff170ce31c6bff11b3138cfd876bf7029dbb271342a058d2f8760ec7df64a8789dc5bee414efb6d3967dad10719ee02634770324996066738ea3e3825085e084deeedd006d91e0eac137ad221acc27ceba27ffe1e51364c478cc6", @generic="d92f4d9d4d01f8e136a0db02f649bda71478f93004898a7fdebc3f9615519651996f4e2937460fe8138bc3779d6448e7", @generic="b5f07b67763bd94d5ba3321137bd16b7566a7858d7050e5cc3060cd21fbbbff7d2190dcf24351e59b1771fe6e9628af142d91adb5a6cf97cddb3f7c5a84231b7c8d39c9cdb823e70e5ea35d0901544cd0bd76877ac2766f18ac8523b6495e9195a4dafe3f0dbb11386d3159a904258439ddc136faaf223226488f261afee14b9c57dd78a73daf1e7228973201eb1c06e938f2b77330cca18ddf3000e81c8ffb330f28a678726ba7d56b0", @generic="4a68e83e8f79d07a81e1d11a43bc5f84178f"]}, @typed={0x14, 0x67, @ipv6=@mcast1}, @nested={0x4, 0x52}]}, 0x4dc}, 0x1, 0x0, 0x0, 0x8000}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000940)=0x6) 18:42:06 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cfe9"}, 0x10) 18:42:06 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) r1 = open(&(0x7f0000000000)='./file0\x00', 0x101602, 0x44) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000040)={0x8}, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498f46e9a57a4", &(0x7f0000000180), 0x6}, 0xc) 18:42:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x2) r1 = socket(0x10, 0x4000000000002, 0x0) ioctl$sock_ifreq(r1, 0x89fb, &(0x7f0000000100)={"73697430001f8000000001e000000e02", @ifru_ivalue=0x907000}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r2, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) delete_module(&(0x7f0000000080)="73697430001f8000000001e000000e02", 0x200) setsockopt$inet6_udp_int(r2, 0x11, 0xb, &(0x7f0000000000)=0x1f, 0x4) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x109000, 0x0) ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000180)) ioctl$KDSKBLED(r2, 0x4b65, 0x20) 18:42:06 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'system.', '\x00'}, &(0x7f0000000340)=""/224, 0xe0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:42:06 executing program 2 (fault-call:5 fault-nth:2): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3}, 0x90) 18:42:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x2b4) 18:42:06 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) open(&(0x7f0000000000)='./file0\x00', 0x101602, 0x44) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498f46e9a57a4", &(0x7f0000000180), 0x6}, 0xc) 18:42:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80002, 0x80) pwrite64(r0, &(0x7f0000000040)="b1117341f28d9588", 0x8, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000240)="ddd1d16c0db4b4ce176260df4ab38d622a3a002fd09a9644973652e8fd732b623c828b82c24d0ceb3bdafdffc70562", &(0x7f0000000280)="0b57ed616a2f9aa9908c87aa78ac4a1f128af55c9f1c99a73edeba2c45f30f7a32ee5fc1c7b1545fd92f1ae25b3f38269442397bf056eb60dcefa6211f0de1ef3f99c03d76f87bc6e13b767d196d17dcf9c19f5949d8283249ca05c42c11bde78638aa855bdb02ee090d674000e0dae1e7fa48af782996835d250824abfb2c58", 0x2}, 0x20) 18:42:06 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000240)="2f3b806a53cfe9"}, 0x10) 18:42:06 executing program 7: r0 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x6, 0xb0002) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180), &(0x7f00000001c0)=0x14) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x40, 0x9, r0}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r1, &(0x7f0000000000)="5b51c9f2c0a2fbfa5de5b74f14b8d9c3fab2f48b396013a0949d44c1fa5c5153f942a1a9bb20626d924086b625875532496b5eceb80e54e95f8e42445c38ea5ee70513d5ce70d66cb10c7d61f96c9e6818ad8ef1e2d0", &(0x7f0000000080)="a9ff2d7300c416e339e1643ee5ffd726922b", 0x1}, 0x20) name_to_handle_at(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0xeb, 0xe3, "3c61395f551bf96f5106957b774b3e41006f6983bfd35153032e6627a0205e5c91d2f465aa47c6ba4ff34e3b0e63fc11007a852831360221c572a7d603811360c38bdf3f60f1995e8373ee74696c3d8bb5119652028198e861749ade94ce0d7f60e48a6e77f97dcc182db8331179e7c2f96120c27c53f2ab39e563f22e7035507ca5998427cf908a840e289f7d12d0277bcc2782e448044d385642607e487f333dc6406a039eaf56675b4cde750f7dd654d6a04a641d6fe8e93ea91bd894380a2653f367135f28ce91d4ffd15bf05af4091c7ab44f70a4ee32e6745023b7bdf986d0c3"}, &(0x7f0000000380), 0x400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:42:07 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_PROPBIT(r4, 0x4004556e, 0x1d) dup2(r3, r2) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x200, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r5, 0x8004e500, &(0x7f0000000280)=r7) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4, 0x0, r6}, 0x2c) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000002c0)=0x0) kcmp(r9, r10, 0x5, r8, r8) r11 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x101, 0x141100) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r11, 0x28, 0x2, &(0x7f0000000180)=0x7, 0x8) unshare(0x203fd) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r8, &(0x7f0000000340)="bf2cd0fb11e31e347097c4ce633e68631d9cad9edacc508f5eaea4608070fa5417e6ac4e6d3beb1f6d80c018a1f4443fe9ec8d0e9194e0fd668ca1f811779c3f19127f85482f41e833ae5f4791c6c24e099398900472dca89ff35851c3554727c9b4f4e7e5b8a4c259626c533d6b826b4d03ae3b154ab7", &(0x7f00000003c0)="a50623b2a7890659cbef673e00cf01aaec47b9e4c56a51ca57175ad4358756534103f75eb2b5b19466ea81ec4bc93609fe0bc738520f454e44af7918f5031368098e2dfd4d114d620ee2437f67a5c0be5392e1d71c6dae011f46517d8dffffffffffff0409756458299800000000000000000000000200"}, 0x20) r12 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x121000, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r12, 0x5380) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r8, &(0x7f0000000080)}, 0x10) [ 517.087833] kernel msg: ebtables bug: please report to author: Wrong len argument 18:42:07 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f00000000c0)=0x40) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000740)=""/4096, 0x2000}], 0x1) getpgid(0x0) r1 = semget$private(0x0, 0x6, 0x20) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000000)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = geteuid() stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = syz_open_dev$usb(&(0x7f00000003c0)='/dev/bus/usb/00#/00#\x00', 0x7334, 0x10000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40042409, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000480)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000500)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r7}}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000400)={r6, r6, 0x3, 0x1}, 0x10) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000340)={{0x1f, r2, r3, r4, r5, 0x2, 0x7fffffff}, 0x4, 0xffffffffffffff09}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]}, 0x237) 18:42:07 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498f46e9a57a4", &(0x7f0000000180), 0x6}, 0xc) [ 517.338775] FAULT_INJECTION: forcing a failure. [ 517.338775] name failslab, interval 1, probability 0, space 0, times 0 [ 517.350484] CPU: 1 PID: 23556 Comm: syz-executor2 Not tainted 4.19.0-rc1+ #42 [ 517.357807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 517.367318] Call Trace: [ 517.369974] dump_stack+0x14b/0x190 [ 517.373685] should_fail+0xa98/0xaa0 [ 517.377461] __should_failslab+0x278/0x2a0 [ 517.381782] should_failslab+0x29/0x70 [ 517.385765] __kmalloc+0xbe/0x350 [ 517.389313] ? fuse_dentry_init+0x59/0x120 [ 517.393604] ? fuse_dentry_revalidate+0x11d0/0x11d0 [ 517.398671] fuse_dentry_init+0x59/0x120 [ 517.402789] ? fuse_dentry_revalidate+0x11d0/0x11d0 [ 517.407875] __d_alloc+0x7f6/0xe40 [ 517.411516] d_alloc+0x97/0x4e0 [ 517.414872] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 517.420320] ? d_lookup+0x1da/0x200 [ 517.423999] __lookup_hash+0x1b0/0x510 [ 517.427942] filename_create+0x302/0xa90 [ 517.432099] do_mkdirat+0x10c/0x670 [ 517.435817] __se_sys_mkdirat+0x92/0xb0 [ 517.439852] __x64_sys_mkdirat+0x4a/0x70 [ 517.443969] do_syscall_64+0xb8/0x100 [ 517.448105] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 517.453339] RIP: 0033:0x457099 [ 517.456584] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 517.475530] RSP: 002b:00007f08b706dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 18:42:07 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/audio\x00', 0x7, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f00000004c0)={0x13, 0x10, 0xfa00, {&(0x7f00000008c0), r2, 0x2}}, 0x18) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e24, @multicast1}}, 0xfffffffffffffff1, 0x3, 0x7, 0x6, 0x94ac}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={r3, @in6={{0xa, 0x4e22, 0x5, @mcast1, 0x69}}, 0xffff, 0x1, 0x7ff, 0x7f, 0xb0}, &(0x7f0000000080)=0x98) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in=@multicast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) connect$can_bcm(r1, &(0x7f0000000480)={0x1d, r4}, 0x10) 18:42:07 executing program 7: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x100) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000240)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) [ 517.483298] RAX: ffffffffffffffda RBX: 00007f08b706e6d4 RCX: 0000000000457099 [ 517.490609] RDX: 0000000000000000 RSI: 0000000020000500 RDI: ffffffffffffff9c [ 517.497924] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 517.505233] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 517.512542] R13: 00000000004d3090 R14: 00000000004c8107 R15: 0000000000000002 18:42:07 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80002, 0x80) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000240)="ddd1d16c0db4b4ce176260df4ab38d622a3a002fd09a9644973652e8fd732b623c828b82c24d0ceb3bdafdffc70562", &(0x7f0000000280)="0b57ed616a2f9aa9908c87aa78ac4a1f128af55c9f1c99a73edeba2c45f30f7a32ee5fc1c7b1545fd92f1ae25b3f38269442397bf056eb60dcefa6211f0de1ef3f99c03d76f87bc6e13b767d196d17dcf9c19f5949d8283249ca05c42c11bde78638aa855bdb02ee090d674000e0dae1e7fa48af782996835d250824abfb2c58", 0x2}, 0x20) 18:42:07 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = syz_open_dev$usbmon(&(0x7f0000000900)='/dev/usbmon#\x00', 0x3, 0x400000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000940)={0x80000004}) unshare(0x20400) r2 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x5, 0x10000) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, &(0x7f0000000880)={'TPROXY\x00'}, &(0x7f00000008c0)=0x1e) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000680)={0x0, 0x4}, &(0x7f00000006c0)=0x8) sendmsg$inet_sctp(r2, &(0x7f0000000840)={&(0x7f0000000180)=@in6={0xa, 0x4e22, 0xffffffffffffffff, @loopback, 0x6}, 0x1c, &(0x7f0000000600)=[{&(0x7f00000001c0)="57a89d419f35ab5084527a89cde98f07815ecc8152", 0x15}, {&(0x7f0000000240)="13d25358c93edc2517372e7fb0f5e1ef4259452261d86f8b60a6a6ddccf2769ad349304637ed5446d4689e6324ee1e05884dc324420fda815d722dc00ed4aaa8f567812ad22380d0ede4a09001ca648090577d", 0x53}, {&(0x7f00000002c0)="5458b82335b369fccd45039d21d881d2b01138a96bc30c2e13a36c3102cbb6a06ff842de029a453e5b27bb252699236c286bba5c4360e29b891f09f447a25476bbaac6aa470098ce0609c2b31b13ef7b047290d27eaaeb", 0x57}, {&(0x7f0000000340)="5d657b92c6c914da571403fb52bc9f521b612a3d68ac51df3baf6c5cc906402339e2194d47347a052a8392a86c17ec6edffa44fd4a54c500f1a6904a51b9adea01331c8510080884fc03f70a7c8a5419d1456a1c7d112979f30f6d5d1532fda6dfb4ca64cf667ef63796bd76aef2de149ea1a0d7e82426791ff836ab4fa89b158d2b9af49c7f141efbc84f841bc8b17768f5a00190c57b28840cae420bc5a4c9335d54e33825392c8b745beb301387e27ddec4038ec0e9b5e0a7a67ff7e96472be405a2603", 0xc5}, {&(0x7f0000000440)="43b9ed3f72e42efa5d26a89b73f20d816937f75a70d62b2a485e61d44077b43ba705ec69bf3f7939130634d30745f0de11786a578624eddfc0496a97aca7df7855fe8b6bbb96d0ba137687b5173c1fa714bb4f4352b33f716a6f3652b65b4db81f882afe58bb13e7598fd4", 0x6b}, {&(0x7f00000004c0)="3bd1b91015e66541502cf9933200cc4103c0622fe25065d0c5c0f296fd521a1c29177e81f25b80361ed636d061b3f947", 0x30}, {&(0x7f0000000500)="b570c9c2f38e8ea8fe401c211564328dce20b62fac3a148a37ad8c39cb781f6a8f7ea0cadbfb29d193cba8a809946bc79809efbac71935cae37e6dea1fccfc87508d01424c18b79b87b51e22144a5064baf40ce11102c93bc30025dbfe4b495b878472726d8437bcef87921458a3b8d4e21d112e91eab747214bebab4e746bf396f8052e1b7f2092c98833f8c147a2204796ee3323bf0a919108ce2b5b9ea901462bd3545369f07ce121ec695db81821c0c2979acf3a3cec16413e568734618617559481addbfb97900859bfdec7071463e90c99e1da1cdba13229f8e1db017c0111aeb46c4b12e0", 0xe8}], 0x7, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000008400000000000000000407000500010018000000000000008400000000000000400020000400010018000000000000008400000007000000ac14140d0000000018000000000000008400000006000000becb000000000000180000000000000084000000060000001e0e00000000000018000000000000008400000005000000300000000300000018000000000000008400000000000000ffffb7000200f4ff30000000000000008400000001000000ff07feff000000000400000008000000010000000500000001000000", @ANYRES32=r3, @ANYBLOB="20419bf17d5c4b95e8000000080000000000000000000000000000000000000118000002000000008400000000000000f1ff9f131bee2210753a6fe82300000500"], 0x110, 0x800}, 0x48054) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x4000, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r4, 0x40045532, &(0x7f0000000040)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:42:07 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f000000c980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000c9c0)=0x14) bpf$PROG_LOAD(0x5, &(0x7f000000ca00)={0xf, 0x7, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}, [@generic={0x8f9f, 0x5, 0xfff, 0x8}, @ldst={0x2, 0x0, 0x3, 0x7, 0xf, 0x2, 0xc}]}, &(0x7f00000000c0)='syzkaller\x00', 0xffffffffffffffff, 0x1d, &(0x7f0000000180)=""/29, 0x40f00, 0x1, [], r1, 0xf}, 0x48) 18:42:07 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498f46e9a57a4", &(0x7f0000000180), 0x6}, 0xc) 18:42:07 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/audio\x00', 0x7, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f00000004c0)={0x13, 0x10, 0xfa00, {&(0x7f00000008c0), r2, 0x2}}, 0x18) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e24, @multicast1}}, 0xfffffffffffffff1, 0x3, 0x7, 0x6, 0x94ac}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={r3, @in6={{0xa, 0x4e22, 0x5, @mcast1, 0x69}}, 0xffff, 0x1, 0x7ff, 0x7f, 0xb0}, &(0x7f0000000080)=0x98) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in=@multicast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) connect$can_bcm(r1, &(0x7f0000000480)={0x1d, r4}, 0x10) 18:42:08 executing program 2 (fault-call:5 fault-nth:3): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3}, 0x90) 18:42:08 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x10000020410) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) fcntl$getown(r0, 0x9) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7f, 0x40) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) 18:42:08 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000240)="ddd1d16c0db4b4ce176260df4ab38d622a3a002fd09a9644973652e8fd732b623c828b82c24d0ceb3bdafdffc70562", &(0x7f0000000280)="0b57ed616a2f9aa9908c87aa78ac4a1f128af55c9f1c99a73edeba2c45f30f7a32ee5fc1c7b1545fd92f1ae25b3f38269442397bf056eb60dcefa6211f0de1ef3f99c03d76f87bc6e13b767d196d17dcf9c19f5949d8283249ca05c42c11bde78638aa855bdb02ee090d674000e0dae1e7fa48af782996835d250824abfb2c58", 0x2}, 0x20) 18:42:08 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) r1 = socket$inet_smc(0x2b, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e21, @rand_addr=0x100}, 0x10) 18:42:08 executing program 6: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498f46e9a57a4", &(0x7f0000000180), 0x6}, 0xc) 18:42:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f00000000303030303030303030303030303030303034fb746408b4dce9e0303030302c757300100000643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:42:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/audio\x00', 0x7, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f00000004c0)={0x13, 0x10, 0xfa00, {&(0x7f00000008c0), r2, 0x2}}, 0x18) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e24, @multicast1}}, 0xfffffffffffffff1, 0x3, 0x7, 0x6, 0x94ac}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={r3, @in6={{0xa, 0x4e22, 0x5, @mcast1, 0x69}}, 0xffff, 0x1, 0x7ff, 0x7f, 0xb0}, &(0x7f0000000080)=0x98) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in=@multicast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) connect$can_bcm(r1, &(0x7f0000000480)={0x1d, r4}, 0x10) 18:42:08 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000117073f1906f70ea0000000000000000000000000000000000000000000000000000ffffffff0100000009000000000000000000766c616e3000000000000000000000007663616e30000000000000000000000079616d30000000000000000724b9693f9404d5e181c361f1462cc3000000000065727370616e300000000000000000000180c200000000000000000000000000000000000000000000007000000070000000a000000072656469726563740063a2888180944b000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000010000001f00ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000fcffffff0100000003000800000000000000626f6e645f736c6176655f310000000069703667726574617030000000000000626f6e645f736c6176655f31000000007665746830000000002a67ccfa5cce81efbab200000000000000ffffffffffff0000000000000180c200000000000000000000007000000070000000a000000062465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000078c9ac7deb10d5cdc1e6310d0928ce021c102b6cfe242f5c0af17b0db50bdaf43260ac04ed7f3c01345b48e60ecd21fe25a671d9aa9ee8b1a0d81d0876013907f4ccdc297c7f4c6a51b3a2609e5d9c6c8794f7f287ad489fd47a683f10c191a5c7adca036be2a2d36d079709f977ffea1d1024a0d36d40fef1d5a12878ec34c4444790f2afc9230f6061c1cc0556ceb3ef2b537a044a183f665b397b61cec36d822cea4ca705e30900b1b10dd7549e0ff35eff85f5838aa5cd1d3b82112ae8890779d02f738c38ac00aac80bc9bff2fe712411ef98d33edb4a56c401ed988a5b6af08b9878115844b8cf90d796d2242a1b1bdf49915a60946ac72af55c764ee2cbbfdd939a1b90ac98d8abd4bb04a8250c8cea5628265197236f336a24b35c94dfe127d0cbd5721c08f4500f20f1a50bc48b05b3"]}, 0x39d) [ 518.550834] kernel msg: ebtables bug: please report to author: Wrong len argument 18:42:08 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x1e) r1 = socket$inet6(0xa, 0x80000, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000100)={{{@in=@broadcast, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) [ 518.679962] FAULT_INJECTION: forcing a failure. [ 518.679962] name failslab, interval 1, probability 0, space 0, times 0 [ 518.691478] CPU: 0 PID: 23639 Comm: syz-executor2 Not tainted 4.19.0-rc1+ #42 [ 518.698791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 518.708175] Call Trace: [ 518.710825] dump_stack+0x14b/0x190 [ 518.714509] should_fail+0xa98/0xaa0 [ 518.718339] __should_failslab+0x278/0x2a0 [ 518.722663] should_failslab+0x29/0x70 [ 518.726630] __kmalloc+0xbe/0x350 [ 518.730219] ? fuse_alloc_forget+0x40/0x90 [ 518.734541] fuse_alloc_forget+0x40/0x90 [ 518.738689] fuse_lookup_name+0x1cd/0xb50 [ 518.742926] ? rcu_all_qs+0x2e/0x1f0 [ 518.746704] ? mutex_lock+0x89/0xf0 [ 518.750422] fuse_lookup+0x184/0x750 [ 518.754213] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 518.759668] ? __list_add_valid+0xb8/0x450 [ 518.764002] ? d_alloc+0x3ee/0x4e0 [ 518.767632] ? fuse_getattr+0x880/0x880 [ 518.771661] __lookup_hash+0x26c/0x510 [ 518.775606] filename_create+0x302/0xa90 18:42:08 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r0, 0x28}, 0x10) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r0, &(0x7f0000000080)}, 0x10) [ 518.779748] do_mkdirat+0x10c/0x670 [ 518.783543] __se_sys_mkdirat+0x92/0xb0 [ 518.787572] __x64_sys_mkdirat+0x4a/0x70 [ 518.791719] do_syscall_64+0xb8/0x100 [ 518.795606] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 518.800880] RIP: 0033:0x457099 [ 518.804115] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 18:42:08 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x101000, 0x0) epoll_pwait(r0, &(0x7f00000000c0)=[{}, {}, {}, {}, {}], 0x5, 0x5, &(0x7f0000000180)={0x92e}, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet6_dccp_int(r0, 0x21, 0x53bcd11f98118c21, &(0x7f00000001c0), &(0x7f00000002c0)=0x4) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) [ 518.823063] RSP: 002b:00007f08b706dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 518.832365] RAX: ffffffffffffffda RBX: 00007f08b706e6d4 RCX: 0000000000457099 [ 518.839680] RDX: 0000000000000000 RSI: 0000000020000500 RDI: ffffffffffffff9c [ 518.846988] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 518.854321] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 518.861630] R13: 00000000004d3090 R14: 00000000004c8107 R15: 0000000000000003 18:42:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/audio\x00', 0x7, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f00000004c0)={0x13, 0x10, 0xfa00, {&(0x7f00000008c0), r2, 0x2}}, 0x18) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e24, @multicast1}}, 0xfffffffffffffff1, 0x3, 0x7, 0x6, 0x94ac}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={r3, @in6={{0xa, 0x4e22, 0x5, @mcast1, 0x69}}, 0xffff, 0x1, 0x7ff, 0x7f, 0xb0}, &(0x7f0000000080)=0x98) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in=@multicast1, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) 18:42:08 executing program 6: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498f46e9a57a4", &(0x7f0000000180), 0x6}, 0xc) 18:42:09 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000240)="ddd1d16c0db4b4ce176260df4ab38d622a3a002fd09a9644973652e8fd732b623c828b82c24d0ceb3bdafdffc70562", &(0x7f0000000280)="0b57ed616a2f9aa9908c87aa78ac4a1f128af55c9f1c99a73edeba2c45f30f7a32ee5fc1c7b1545fd92f1ae25b3f38269442397bf056eb60dcefa6211f0de1ef3f99c03d76f87bc6e13b767d196d17dcf9c19f5949d8283249ca05c42c11bde78638aa855bdb02ee090d674000e0dae1e7fa48af782996835d250824abfb2c58", 0x2}, 0x20) 18:42:09 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]}, 0x248) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) 18:42:09 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000240)="ddd1d16c0db4b4ce176260df4ab38d622a3a002fd09a9644973652e8fd732b623c828b82c24d0ceb3bdafdffc70562", &(0x7f0000000280)="0b57ed616a2f9aa9908c87aa78ac4a1f128af55c9f1c99a73edeba2c45f30f7a32ee5fc1c7b1545fd92f1ae25b3f38269442397bf056eb60dcefa6211f0de1ef3f99c03d76f87bc6e13b767d196d17dcf9c19f5949d8283249ca05c42c11bde78638aa855bdb02ee090d674000e0dae1e7fa48af782996835d250824abfb2c58", 0x2}, 0x20) 18:42:09 executing program 2 (fault-call:5 fault-nth:4): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3}, 0x90) 18:42:09 executing program 0: r0 = semget$private(0x0, 0x88b0e6bbc4228ea7, 0x54) semctl$GETPID(r0, 0x0, 0xb, &(0x7f0000000240)=""/4096) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f0000000080)}, 0x10) 18:42:09 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/audio\x00', 0x7, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f00000004c0)={0x13, 0x10, 0xfa00, {&(0x7f00000008c0), r1, 0x2}}, 0x18) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e24, @multicast1}}, 0xfffffffffffffff1, 0x3, 0x7, 0x6, 0x94ac}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000240)={r2, @in6={{0xa, 0x4e22, 0x5, @mcast1, 0x69}}, 0xffff, 0x1, 0x7ff, 0x7f, 0xb0}, &(0x7f0000000080)=0x98) 18:42:09 executing program 6: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498f46e9a57a4", &(0x7f0000000180), 0x6}, 0xc) 18:42:09 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000640)={0xffffffffffffffff}) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000680)={{0xa, 0x4e24, 0x2, @remote, 0xffffffffffffff16}, {0xa, 0x4e23, 0x72, @loopback, 0x6}, 0x9, [0x6, 0x6, 0x7, 0x3, 0x6, 0x3, 0x10000, 0x9c]}, 0x5c) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id}', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="e402c526652d862c00"]) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:42:09 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0xa4, r2, 0x0, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@loopback}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x100000001}]}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x401}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9fa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x800}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x100}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x8004}, 0x4000000) 18:42:09 executing program 1: r0 = socket(0x10, 0x20000000000003, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000640)={&(0x7f0000000040), 0xc, &(0x7f0000000600)={&(0x7f0000000540)={0x14, r1, 0x401}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000002bc0)=[{{&(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000001140)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/216, 0xd8}, {&(0x7f0000000200)=""/98, 0x62}, {&(0x7f0000000400)=""/144, 0x27d}], 0x2f8, &(0x7f00000004c0)=""/63, 0x3f}}], 0x1, 0x0, &(0x7f00000027c0)) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000680)={0x0, 0x40, 0x6}) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x246, &(0x7f0000000080)={&(0x7f0000003080)={0x14, 0x1a, 0x201}, 0x14}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x804a0440}, 0xc, &(0x7f0000000580)={&(0x7f00000008c0)=ANY=[@ANYBLOB="00401000", @ANYRES16=r1, @ANYBLOB="10002abd7000fedbdf2504000000681a030008000c0002000000fed90000ac1414bb14000200000000000000000000000000000008000500ffffffff1400020069701667726530000000000000000000140006000000000000000000000000000000000108000800090000001c00020008000500001000000800050000f0ffff08000700fffffeff080004000500000008000500018000005800020008000900080000000800060023cb00000800090023c600003f9845270500000014000100ffffffc100000000000000000000000008000b0002000000080002000005000100000808000400000000400000000000000000000000"], 0x10c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000ac0)={&(0x7f00000009c0), 0xc, &(0x7f0000000a80)={&(0x7f0000000a00)={0x44, r1, 0x24, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'gre0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x10}, 0x4008801) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f0000000b00)=ANY=[@ANYBLOB="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"]}, 0x2b3) fcntl$addseals(r0, 0x409, 0x8) 18:42:09 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000240)="ddd1d16c0db4b4ce176260df4ab38d622a3a002fd09a9644973652e8fd732b623c828b82c24d0ceb3bdafdffc70562", &(0x7f0000000280)="0b57ed616a2f9aa9908c87aa78ac4a1f128af55c9f1c99a73edeba2c45f30f7a32ee5fc1c7b1545fd92f1ae25b3f38269442397bf056eb60dcefa6211f0de1ef3f99c03d76f87bc6e13b767d196d17dcf9c19f5949d8283249ca05c42c11bde78638aa855bdb02ee090d674000e0dae1e7fa48af782996835d250824abfb2c58", 0x2}, 0x20) [ 519.780179] kernel msg: ebtables bug: please report to author: Wrong len argument 18:42:09 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498f46e9a57a4", &(0x7f0000000180), 0x6}, 0xc) [ 519.853354] kernel msg: ebtables bug: please report to author: Wrong len argument 18:42:09 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x0, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000240)="ddd1d16c0db4b4ce176260df4ab38d622a3a002fd09a9644973652e8fd732b623c828b82c24d0ceb3bdafdffc70562", &(0x7f0000000280)="0b57ed616a2f9aa9908c87aa78ac4a1f128af55c9f1c99a73edeba2c45f30f7a32ee5fc1c7b1545fd92f1ae25b3f38269442397bf056eb60dcefa6211f0de1ef3f99c03d76f87bc6e13b767d196d17dcf9c19f5949d8283249ca05c42c11bde78638aa855bdb02ee090d674000e0dae1e7fa48af782996835d250824abfb2c58", 0x2}, 0x20) 18:42:10 executing program 7: r0 = socket$inet6(0xa, 0x7, 0x7f) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001340)={'team0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000001380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000013c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001a00)={'team0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000001b00)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x81800001}, 0xc, &(0x7f0000001ac0)={&(0x7f0000001a40)=ANY=[@ANYBLOB="640000001a0000002bbd7000fedbdf251c800005fd01fe010020000008001a000300000008000400", @ANYRES32=r2, @ANYBLOB="08000400", @ANYRES32=r3, @ANYBLOB="08000400", @ANYRES32=r4, @ANYBLOB="08001a00a100000008001a000700000008000400", @ANYRES32=r5, @ANYBLOB="080001000000000008001a0007000000"], 0x64}, 0x1, 0x0, 0x0, 0x40}, 0x48000) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000000)=0x3, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r6 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1a0, 0x200000) ioctl$EVIOCSMASK(r6, 0x40104593, &(0x7f0000000080)={0x11, 0x1000, &(0x7f0000000240)="83d3bd899098bcdfd54e61481b448644637581bb22e18b4cf58d155a3555f8320664dc057b57db223790583ffe7f549ed19b094d6345da85f3128c784fd3e6a6fb8784b9c82c8ed21cbe30c1dae5c46289e2c5d14cd2d82c90b2395fee670966e1c4005984e535c3c57bdba10eb686aff7c8ecf894da5139e2406fe18f3917b6583997f2f9b1ce35fea168d0fa7d6a5e47d85493c3e60cf18642c3c4ba43000aac02965e0b1e330607df0ac07262395764660ba5ba3387d9b7e0ca0933a4026dac948b73b652d66b99e4c01b8ed2a30b866d28683276b44785776ed2ff23e50e7abc1f05c4b25c2a5366d57bc04daf9f2090376c8bb0e6029c94c41ad3929b0cd488d8ef62d8d8f2e701cde6d97d11200f8a0f7c05f48a0d1233519499778672df03af8286f58c46fa614d321b764b21a39e96cc38dcad5640e555aa343a53ea337fd90fbd4c0dd5b8f8897d495f15b9f41a945ea256aeda05feb2d427bfeca811509efb15d10d164e9cab7ff4245b6cc8611726fea5fc00a95ea3577499275e2c64edd1e2806fe0536c1bd95bf9a9ea2a7cafc0ff33e42bf2259db9c54f86ec3f8fb6af7173aaa5fd2efd19533962caa8e5c4ff3fdc3875fd44fb92d5eb08859ec376be27648b443a70d0860e19d5c138770b58f9e703407d267fbf3d6de73d99d8c60ad674a78faffd533cc28bf993cd387dd91b5bd053f569bc5f20dfa6ef57d1e357943c9835f9a6f60d2ce649267bcd8bdb5629838bcc8d3f7cd22809f778b37a83c9e6c63c922d87030bcd3358fd615bdcf53d1f51ddbb2c43db3b0c280c8213069d4ddd407584f560e3ddef0bbe2966766b482f4421f1937ae666ae998cb2a325f75e3683286647cd19ae034f1e930cc0dca11e02a363f6e1d5ec5762d1a567927dd9c73390029ea1d6c838f8fa35b15017bd0663f2dfe46bac419fa572af3678ed8e0600e923e6779f89b210cf0460028249a03b57368eec805d9f438fa83e49e4759ffef1d9e609495b9bff4e8abc0b99799d6d84a95260bf26cf2efacf6a0409c81d01e2e6f6793ca8cc2f15ee6b8af1e2662dd172c10e80c295a695649688f74e61d73300292ec159370b5662779d8a1c164f16c3b02ab22f54f6bb0640412e2d941d708da9ce4f75338f64a01cacfa7e2e4bb301ff8626f1dbae141c661f8f526773b7b337ed908bda2cb844ef9fb7844f7ad4399ec8f27fe9c4949618c84f443a1646eed76cf7f887bd249b2fa91a816c48b67afae145a020e352ce1593b569e71964f0961258200dfa0068719f6e2a300819e6acd2dc29b36b78d3456f9d2492bf5c7b5d2dcac2fb94bf060dd8ce9b680bff9bf80e378c32c4606d0076d48f5feed803b68211dcc968a5a7ce3ceee075485c94305aa370bac8643b5c9f8b0959f1d9a082ad596910f9aaaa906a38eef3102780a0bcc9c3950bbecb9eddfd9b88635ccf8b1547e38d3e8b5a63d66530c35f1c2e93ff1acadfd5cecd219e01156050c0e74abf4387f08c6dc65f3929316d1243ef4ce63c36b3cd682babf221a10ddd48073ec2122084a9e692f6817a60a55ddc741258cd367b31fe9b9b83dc4fba4920cb47cbaf3ca664911f726ff1d3cf07a4866aaa9501f0ff719e1ff88fe0bdfe753d7d06ae79f81d44aeaa0ad0d5bac5d49034724d64481a7d146e0fed4c6aa68c0e4790afcb357294de4ab0b7cc68b3b0eff64493795c8747632b0437041e9171476912bc3bdb51576c2ddd18f2910352cfe58b6f693e9b0d0c394b16b614064afb360623db69b4fe168c735c926c4cd0be0b2feff90e82a8e0227df83eefdd330df73f467cd364101fce20269dd7df99eabb0c72e7271de6caa3484b042eb5380338dc5ab6c92e608bd8bb179f83e4fa12470ae513b5eb5cd8cb690247334ff83a69898f0865c9bbd3b59cd487cfdf500a15be85a7c71a0d7d1beed0dc37d85d06a2d4b20442d1947539269ff29fd00cd1f5f9fb0432616bd261a09c86f040954d54ba20c89155a08d4a1977be2b710074c3a4f789270d3aabcd395c374871790c7ec4fd2891015f6cb326943cc73fdf2bd73910998fc908ada799f5f2e3afa1885cee3c1a378023760c4585a34cd40b6b28aeb2dc1e2e1f6cffe346000bf6f3e9e13dab7d633e037faba87647be2eedf7ce1230d646e18743852a98ee51c8c72eebd6f1ea8ece89b5b9f1186049ef792b1c2fcb794033d21195a2af868cafe3506ccde83c50ccc4b5079129c14c8b49695ddb4d147e2e6abc2a64c471905c857cc0a174f60d6096ec420357f6575bcf98f6324c2414249559b0b2385cea2baedc1f5da213e552747053801e933b5407f105bd9e92da119fb5143a3bff435fb757903980ec90a028ca0c8ad20999332fe13490f0d496f9804b806cbb859c73783e37d5c47b320d9f302c4799029425e68c644bfb78598f9cfaf090754e85e80b26f68776b6fe21e97b1c996cc4fa88350c33f1ef2d1aa81e426f9c2543a2c2128971d727abfa62dcca76cfb901c6e086275b2fa1f498e153728f98f5e1ed4b3c34877dde6548dbc0d2f43df701a202b7be727f4f4d71d531b5baf0f536f1bb37e23dd86aa7ca97a000eeae944189de7ec8dbdc3626d75ed8fe001d473dc79686806f80b7b6c97d44f72f86f730bd611a90abaf9a8279b541b8693a4247d38a68c7d83dae20892443637ad7500f3c84156ae89244c930cc1d17b99f844d4974573fce607468c03a9c78702cd9bee43d72ff62764d36d7ec78f3330ed10559926e986bc399569d51cd35e754f38b65ed7e8efdbc7d8b963f8aba1efd24d1daf22b8860164f3d4aed05d5209082151f92b9011ff18ba91869f44a1bb9205c048fd58ac653ba8182ba36695ce75b51b5a237d62d69604eb9340eaa04d30701733fec04ec595732f5f74e079824d5bc21cc76146d97176e2f5189686ce92fdab0448b14acaf9a86cd954c3efa4094420bfd276090f0b589d6ea03a0e335afa0377dc76005875a9a65dade84a77764056cb48d54939f57fe9851c0ca21c87549f9858f06679d992951026bfaaa829a8b364cb684f7a4b6ee545b36d9062a5ddcbf20d48237d0ce9595f58124a8e260d0d893ddb51b1b75f3962bf7c6dd349d6a1b6aba32a0d66c5a976ed9baf78b042861292b65cab8e8ad7a33ab7ee820b1deb613c99deb9fcf63de0ab0de3a3c906026e2e43146ffa82a4eeaa319105c8fc675d6ea493aa0de1c49413400d4edc3b99034710a1ab727507a0205b7d5176cf7c52ee16eacf1e5925c58643af29ed59c2759cb514fe7d2b1c292f23e970e725ba42cf36d9ce44e159018cca601d8ae2963e550be059cdcb52fecd7bbda208336051d869937b79bafecb3b47a6f9c367580bea52390a77bf27cb84c6d1d9c585251a8e815d27105a0d95923b50718c9174bb1430286b6eb0bfe82b725eba0b98c476d2ff35d624b8085f45b24879a6be7bb3ee8b05f6ef7a6f36ef38241ef2028675f134c36d2d23e70da22264dd4655acb36fa66e13b59e60fd82743f539d2d8b3c9f103a279d871d2bd972555392fee63cc7eb13030690030fb21697dbf8adad47e21b291ba676965ea631345ea1b7403e8d54cc087d7b509c235680fa6f31c4cffccdccdb30ec5a14838ed0bc9a2d1e443bcde2a297d7bd2e7138337166fb08f52e22c679f241d9ec76813ce1a2391ee5d2d125f288d677f8462e85f2235b3b9386f1712bf1d5f6f665534a2357139d93cf4b302970655e3fa5db84d779eaab56dc3917ce8da71eacabfe591f358791ec7bd56adeadf34f163c18f9e37f3795cd7c5efb1213db9a04bc1b2657fe2c48a6ecdbfe412eb226a89943f5a363ba264839fee37b9095c80d1f39afaa6f58cdcf5b4a6ec8dd06b8f30a444eec31d5edf5b3d62037b64aae97bd3d1c590c50924694ee8a858682dcd08969d4fb316ef0e384fb682fec5fef5b120ca4cde8f636db2333cce07aefd945cb14048e25437debd1a76222de26e24e37d2cf314ce544677649794b56188f84dc6210dbda759e5aee0a77efa8d5c8682c54ebfc87696927384292b10ca720741e0796f5ee09968d9a768b33d45d7a8b48537d522dbc6e72a438acf3a0f9861751d2b4b0f2d3667bbaaa0a5e72a62ad48354f562313c50380bf13784f999c03dc0857f3044ffda612355a3bfbff704cbe09c2684d61565fac96ca8c8ed66da578069bd3e9b6e8e21107057780c1d7d51f0304db91acbc610aa62f96b3ac8515cd3f103752f84635c50a8718f22daac4b2e5ac5cb8da6910235dc418ee87632da0a1be717f1d0c77545dac4af4d9ee22282d1e38bb9ad12df7e8af2479a4b86de93461ba6c06f7c280ff690ea0451ed8b783ff14ae3d206dd923fcb17b13f1464b267266c6ec821e377a07116d27334690731c5a3dab0a26635f11d7e7fabd58a8ec430d4aa34b15b32616e4937a2f5d6a5526638bd3e3813d2567f08af34e9add1c95ddc93f28c6b406103eddffb1e09a6329f4eee012792399d5ca2263fc4ac1cb6d66c6d3a218e6ad26b29d6c38646cefd77117953d5bd3249482c8637ff4afa668e49e001a8fcfc4a889a9ed46d3fbaca9d144239024d6c4099c7ed5a5d232d8507b7a3b612a249b23187024964fd4b3d10490cc170ef31cb771f8261f0d854284e350313640d5120ee556a728aeee53073e5444a77b451341be36164477b6678755735eff55cde520692dd6258a60832e08b0f9e3ec7727ebf7df0bd54f7dfb72c2320d1c7bab3b27781626fc6d1a1ceb032ccf11eb6d202360799af43cdd2dc3d0702dba437519e2109de6ef6f787238219dad10fd48f0f41d92910e8b0fab9e08b8c2b1a19cb44894d2f81731170a0fa9ac1e859f2b4b9bc6a065f8fea6bc71e69c48c6c05acb18cf577fe97f0f108b36dc5d66169c0fd8377d10747a45e55f3651b1fe17023bd8d1c89f0b337ae67c8ac064e844d25993e299414fbcf026f8b8fe7b8a4bcf776af1c6e182ee07822e738f3f3fe2e9371472b10c2873582ba6d5538d7229434d57b3716873dd1648aad144a790e3d79f9f9dbcc34da1b58926f0f53c26b8824a8bc1800eeb647bbb43180230bf09fbfd7bd315b2ebf3c971bb8001f62ea9f6ff3fdd2489cf87342a582a9d9c1d3fd86f5416007a539d0ed98e6a2039476548196b173a67bc1c69fc667e6b425bb12b253e5bb55654d9a3d92ca528946f90fcb2fe9463b069c60e0fc04c46d8308bc59865c4a8c43f62588a70d6962e3cbd1a325c09edd3ac8871c316af92a76e29206ca3ffca15d7916c531dd5d928721a3cb2f36bb1ac6edfcf6b48eb0935323c3c6a2c62c5163ae94f0fc346c9e82b9c4be39870e24a21ea1f191be79910f5aee5a4418d54c32b44ba74e8f5473157258f10eab1dfe97195632f9dbe6b91e8464ed8d02016f05d22847f2c48d15e3760a77f29488a0297484d5e5b6b148660fd7d8ce6099626e01e3ccc37bd54635ae4a51f15ebf8ac02c0a69a754b4d180522c5ae703804439755cab90da95bd4dcf252e754abbe282841f01517e2aec7b48c798ad8a22d7fdf7384f151dadd6a9728964b8e6c31dae0b45cd1e2dc9f0b80e7b8e8a9dea038ffe7c180d1f25a6253dcc6ec117ceaa431597f448d9ca6a81aaade3d93d6a3e11089b6359387dc4ceae443027c40e6ba844f03a574bb82e926bb0a30d085fcc0377d8a6d7401aebbd7cef085fffe5bdc4851f35fb970644f8756e8e7a938d5db49c8a69000b82f5fd15079fe74990c3e433b5445aac552ad48f435684767c25363b67a"}) 18:42:10 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/audio\x00', 0x7, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f00000004c0)={0x13, 0x10, 0xfa00, {&(0x7f00000008c0), r1, 0x2}}, 0x18) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e24, @multicast1}}, 0xfffffffffffffff1, 0x3, 0x7, 0x6, 0x94ac}, &(0x7f0000000040)=0x98) 18:42:10 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x4e23, @local}, {0x7, @remote}, 0x4, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x16}}, 'team0\x00'}) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) 18:42:10 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000600)=ANY=[@ANYRES32=0x0, @ANYBLOB="f400000078ec731c143d4eb6"], &(0x7f0000000640)=0x10) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000680)={r2, 0x9, 0x3, [0xf04e, 0x5, 0xc6]}, &(0x7f00000006c0)=0xe) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r3 = dup(r0) connect$rds(r3, &(0x7f00000005c0)={0x2, 0x4e20, @broadcast}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f00000002c0)="82a0e1ebcd6bede12c5d0a18163ab6a3ef00cc0b1dac7f2bdea0960e91c033a5b9adea3c92c7ed7e3616b181726aca54b7e6659f1f46c0daec7ac8349d5d24920f477dd3522883b2c773a2edb417aa771cec4ccf00c6128a6e3b52938ee9d5b07abb481a30282a556449d1ee79530e73765fdf37415e26bc1d5c62f05bf48f8fa6324344d31d77c9a747446a4f2fd687b5", &(0x7f0000000380)="8b3e5d4235d3a9b47789b9c795a57b6b54e27e0d104ad2802ce6ddd4908c7476149342bd0aaf3dbb3603fddb0f8d2fe0de8f083627d620953b2ef2f7a8d75c42dcf8e726b88b71e0266974beae86d2fea5ee1e9cd2c4720d44a1003aa93646135254d8fbdc7a45f48a86c04527fa0dcfba2dfadb8b3083799d469f0e944d73c69e4b539ba2858ef8eb2db5e86af1bbd249050214c26db5a78ee268f9c87666b064c39ff6a37f647a7d4479ca89"}, 0x20) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000080)={0x0, @remote, @multicast2}, &(0x7f0000000100)=0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000580)={r0, &(0x7f0000000480)="f456f7ac21e9fc98e7bc5cc118771f67ff67bd23d787c4de24127f08cf2e474d5d93258d73d7a92da41af80b725a09db423ae1da0c4afd1d9839fc976f555e9f89d5377d8c2b8ecdf447b1de3e29f2aa725e1ee483a1b4ed5f17891655c0a464c3c48102244c0e4b2f92adc68e291331abad2fa8ee83f1038906", &(0x7f0000000500)="18ffcb2515f79a6cf12f6b1f6917b1abb0693f9a2aded3a56a345274457977714c1efebfa6ae7e068770868793ef3e623337594d7d68f783d7870920d833c210d46628ed22a3f15950e887aca677e64b422ae431ff47d97e596b7829114b79383dfc42f6", 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x4, &(0x7f0000000000)=@raw=[@generic={0x39, 0x7fffffff, 0x3ff000, 0x20}, @ldst={0x3, 0x3, 0x0, 0xb, 0xb, 0x80, 0x10}], &(0x7f0000000040)='syzkaller\x00', 0xf, 0x7b, &(0x7f0000000180)=""/123, 0x40f00, 0x1, [], r4, 0xa}, 0x48) bind$can_raw(r3, &(0x7f0000000700)={0x1d, r4}, 0x10) 18:42:10 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x40000) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000180)={{0x2, 0x0, 0xdf06, 0x3, 0x2}, 0x9, 0x54}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x307e, 0x200) mkdirat(r2, &(0x7f00000002c0)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000002000), 0xffffffffffffff0b) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:42:10 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498f46e9a57a4", &(0x7f0000000180), 0x6}, 0xc) [ 520.692289] FAULT_INJECTION: forcing a failure. [ 520.692289] name fail_futex, interval 1, probability 0, space 0, times 1 [ 520.703863] CPU: 1 PID: 23707 Comm: syz-executor2 Not tainted 4.19.0-rc1+ #42 [ 520.711171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 520.720552] Call Trace: [ 520.723199] dump_stack+0x14b/0x190 [ 520.726899] should_fail+0xa98/0xaa0 [ 520.730708] get_futex_key+0x32a/0x1c50 [ 520.734781] ? kmsan_set_origin+0x93/0x150 [ 520.739111] futex_wake+0x17b/0xbe0 [ 520.742814] ? kmsan_set_origin_inline+0x6b/0x120 [ 520.747759] ? mm_release+0x319/0x690 [ 520.751646] do_futex+0x9f6/0x6a60 [ 520.755277] ? __msan_chain_origin+0x69/0xc0 [ 520.759759] ? kmsan_set_origin_inline+0x6b/0x120 [ 520.764678] ? __msan_poison_alloca+0x173/0x1f0 [ 520.769430] ? uprobe_free_utask+0x52/0x870 [ 520.773836] ? mm_release+0x130/0x690 [ 520.777783] mm_release+0x319/0x690 [ 520.781465] exit_mm+0xbb/0x790 [ 520.784826] do_exit+0xbf7/0x3890 [ 520.788326] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 520.793877] do_group_exit+0x1a0/0x350 [ 520.797828] get_signal+0x1425/0x1ef0 [ 520.801709] ? __msan_poison_alloca+0x173/0x1f0 [ 520.806459] ? rcu_all_qs+0x2e/0x1f0 [ 520.810251] ? _cond_resched+0x38/0xc0 [ 520.814212] do_signal+0x11d/0x2060 [ 520.817916] ? kmem_cache_free+0x85f/0x2b60 [ 520.822318] ? kmsan_set_origin_inline+0x6b/0x120 [ 520.827232] ? __msan_poison_alloca+0x173/0x1f0 [ 520.832522] ? prepare_exit_to_usermode+0x46/0x410 [ 520.837526] ? syscall_return_slowpath+0xdb/0x700 [ 520.842444] prepare_exit_to_usermode+0x273/0x410 [ 520.847333] syscall_return_slowpath+0xdb/0x700 [ 520.852089] ? do_mkdirat+0x153/0x670 [ 520.855966] ? __se_sys_mkdirat+0x92/0xb0 [ 520.860171] do_syscall_64+0xde/0x100 [ 520.864019] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 520.869249] RIP: 0033:0x457099 [ 520.872482] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 520.891438] RSP: 002b:00007f08b706dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 520.899215] RAX: fffffffffffffffc RBX: 00007f08b706e6d4 RCX: 0000000000457099 [ 520.906523] RDX: 0000000000000000 RSI: 0000000020000500 RDI: ffffffffffffff9c [ 520.913830] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 520.921137] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 520.928452] R13: 00000000004d3090 R14: 00000000004c8107 R15: 0000000000000004 18:42:10 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x2000, 0x0) mkdirat(r0, &(0x7f0000000ac0)='./file0/file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d303030303030303034303030302c757365725f6933c0f7675f4ff6a78cf9314e643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dsp\x00', 0x40040, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @local, @loopback}, &(0x7f0000000680)=0xc) stat(&(0x7f00000006c0)='./file0/file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000780)={{{@in=@multicast2, @in=@remote, 0x4e24, 0x5, 0x4e23, 0x4, 0x2, 0x80, 0x20, 0x29, r3, r4}, {0x5260, 0x4, 0x7f, 0x7, 0x7, 0x400, 0x3, 0x1}, {0x14, 0x0, 0x8, 0x1}, 0xab24, 0x6e6bba, 0x2, 0x0, 0x2}, {{@in=@local, 0x4d3, 0xff}, 0xa, @in6=@loopback, 0x34ff, 0x0, 0x3, 0x8, 0x81, 0x1, 0x6b59}}, 0xe8) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f00000030c0), 0x1000) readv(r2, &(0x7f0000000180)=[{&(0x7f0000000340)=""/163, 0xa3}, {&(0x7f0000000400)=""/252, 0xfc}, {&(0x7f0000000540)=""/171, 0xab}, {&(0x7f0000000080)=""/44, 0x2c}, {&(0x7f0000000880)=""/225, 0xe1}], 0x5) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x100}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000980)={r5, 0x2, 0xbe61}, 0x8) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r1, &(0x7f0000003000)={0x90, 0x0, 0x3}, 0x90) 18:42:10 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x0, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000240)="ddd1d16c0db4b4ce176260df4ab38d622a3a002fd09a9644973652e8fd732b623c828b82c24d0ceb3bdafdffc70562", &(0x7f0000000280)="0b57ed616a2f9aa9908c87aa78ac4a1f128af55c9f1c99a73edeba2c45f30f7a32ee5fc1c7b1545fd92f1ae25b3f38269442397bf056eb60dcefa6211f0de1ef3f99c03d76f87bc6e13b767d196d17dcf9c19f5949d8283249ca05c42c11bde78638aa855bdb02ee090d674000e0dae1e7fa48af782996835d250824abfb2c58", 0x2}, 0x20) 18:42:10 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498f46e9a57a4", &(0x7f0000000180), 0x6}, 0xc) 18:42:10 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000200)=0x2) r1 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x2, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f00000001c0)=0x7, 0x4) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x20000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001a00)={{{@in6=@dev, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001b00)=0xe8) bind$xdp(r1, &(0x7f0000001b40)={0x2c, 0x1, r3, 0x25, r2}, 0x10) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000040)={0x4, [0xda6, 0x6, 0xdb, 0x6]}, &(0x7f0000000080)=0xc) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x7, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [0x0, 0x100000000000, 0x0, 0x0, 0x2], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [0x0, 0xff], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) 18:42:10 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/audio\x00', 0x7, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f00000004c0)={0x13, 0x10, 0xfa00, {&(0x7f00000008c0), r1, 0x2}}, 0x18) 18:42:10 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) r1 = dup2(r0, r0) sendmsg$nl_netfilter(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1022000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000340)={0x150, 0xf, 0x7, 0x400, 0x70bd28, 0x25dfdbfc, {0x3, 0x0, 0x1}, [@generic="31e8781add78f8d9836f66894d6cf65a87141c8d6ee3a6436c12fe88a8144d10f314f147389a3768cc83b786f38bbb3c5a192e9754b2f2f1089caeeb1edd46ecebc66655f3b4bdfcc6ae9a863c26310430b30fa7ac9a54818bfcf7ee3ba80679f49220a5a37a5da1ce921153739e073b24179f87944c13a8ae5a4b632e1aff7c73d6525875551f74af58a09f01132efdf5b23903f1220a3a498c5e6e9c608681d2a6a04ccc7a458dfe37ce1cf9a1abf4fc4715e24f6e0276fa295ace1a462c40e220e152a46175f85186e290bdbac6ca0f4c", @nested={0x14, 0x24, [@typed={0x4, 0x2a}, @generic="5c93022d3be0963a25"]}, @typed={0xc, 0x5, @u64=0xa0a}, @typed={0x8, 0x82, @fd=r0}, @generic="cc41a4821dc4185a58507f2224490fff89381524672efed7004b67b2ba8bc3b3ceb3836c5a4ce8358b90d9dd8e3c6cca02c97ba5e4721602419c48245cb02daaad"]}, 0x150}, 0x1, 0x0, 0x0, 0x4005}, 0x8045) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:42:10 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0xfffffffffffffff7, 0x7, 0x4, 0x0, 0xffffffffffffffff, 0x32a}, 0xfffffffffffffec8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) sendfile(r0, r0, &(0x7f0000000000), 0x5) 18:42:10 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000000)=@generic={0x2, 0x6b58}) [ 521.120201] kernel msg: ebtables bug: please report to author: NOPROTO & 802_3 not allowed 18:42:11 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x0, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498f46e9a57a4", &(0x7f0000000180), 0x6}, 0xc) [ 521.198771] kernel msg: ebtables bug: please report to author: NOPROTO & 802_3 not allowed 18:42:11 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x0, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000240)="ddd1d16c0db4b4ce176260df4ab38d622a3a002fd09a9644973652e8fd732b623c828b82c24d0ceb3bdafdffc70562", &(0x7f0000000280)="0b57ed616a2f9aa9908c87aa78ac4a1f128af55c9f1c99a73edeba2c45f30f7a32ee5fc1c7b1545fd92f1ae25b3f38269442397bf056eb60dcefa6211f0de1ef3f99c03d76f87bc6e13b767d196d17dcf9c19f5949d8283249ca05c42c11bde78638aa855bdb02ee090d674000e0dae1e7fa48af782996835d250824abfb2c58", 0x2}, 0x20) 18:42:11 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/audio\x00', 0x7, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000), 0x13f, 0x8}}, 0x20) 18:42:11 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0xff}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f0000000080)}, 0x10) 18:42:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000080)={0x1, 0x1, 0x10000, 0x6, 0x200}, 0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643da0d186f2b0a1af8997dc2f02144d23f0169da4c3501093a6f988e899f6afe45cca998c6c565b1d00000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = dup3(r0, r0, 0x80000) getsockopt$packet_int(r1, 0x107, 0x12, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x400, 0x0) ioctl$RTC_PIE_ON(r2, 0x7005) fcntl$dupfd(r0, 0x0, r0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:42:11 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) 18:42:11 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x0, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498f46e9a57a4", &(0x7f0000000180), 0x6}, 0xc) 18:42:11 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x0, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000240)="ddd1d16c0db4b4ce176260df4ab38d622a3a002fd09a9644973652e8fd732b623c828b82c24d0ceb3bdafdffc70562", &(0x7f0000000280)="0b57ed616a2f9aa9908c87aa78ac4a1f128af55c9f1c99a73edeba2c45f30f7a32ee5fc1c7b1545fd92f1ae25b3f38269442397bf056eb60dcefa6211f0de1ef3f99c03d76f87bc6e13b767d196d17dcf9c19f5949d8283249ca05c42c11bde78638aa855bdb02ee090d674000e0dae1e7fa48af782996835d250824abfb2c58", 0x2}, 0x20) 18:42:11 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x6, 0xd, 0x14, 0x10, "888e3d2fd6f263fb4ca621f411c3f9c87ada16b2e1b9e85e19d9a9ed9d42cbeb3ecbbacec3d4bbefc98cba756caadd66304dff7a8c3428b4bd16edda317f6ef8", "e1304d035de4d8e059076dda70b07cb2766fdc44e437d1afcccbc1ea414c4878", [0x0, 0x3]}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x3, 0x42808, 0x80000000000000, 0x200}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r2, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r2, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r2, &(0x7f0000001000), 0x1066) write$FUSE_ENTRY(r2, &(0x7f0000003000)={0x90, 0x0, 0x3}, 0x90) 18:42:11 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = socket$can_bcm(0x1d, 0x2, 0x2) r2 = accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) sendmsg$can_bcm(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r3}, 0x10, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="0700000000000000000000cb2dd1e91800", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="0200000001000000030000c005020000158130d2d5ff9c2b"], 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x8000) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f0000000100)=0xd8) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x20000, 0x0) ioctl$UI_SET_KEYBIT(r4, 0x40045565, 0x1c5) getitimer(0x1, &(0x7f00000002c0)) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x80, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:42:11 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/audio\x00', 0x7, 0x0) 18:42:11 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400300, 0x0) epoll_pwait(r1, &(0x7f0000000040)=[{}, {}], 0x2, 0x8, &(0x7f0000000080)={0x39da}, 0x8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00', 0x19, 0x4, 0x4c0, [0x200001c0, 0x0, 0x0, 0x200002b0, 0x20000538], 0x0, &(0x7f0000000180), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x10, 0x88f7, 'veth1_to_bridge\x00', 'ipddp0\x00', 'bond_slave_0\x00', 'sit0\x00', @local, [0xff, 0x0, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@log={'log\x00', 0x28, {{0x55, "90eb50b0fcacc899cc7b6c568026d284238a35771efd17d86cdec962a3fa", 0x6}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x2, [{{{0x11, 0x0, 0xe8e7, 'ip_vti0\x00', 'veth1_to_team\x00', 'bond_slave_1\x00', 'ip6gre0\x00', @remote, [0xff, 0xff, 0xff, 0xff], @random="06baeb237761", [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@link_local, 0xfffffffffffffffd}}}}, {{{0x9, 0x10, 0x6558, 'erspan0\x00', 'ip_vti0\x00', 'bond_slave_1\x00', 'nr0\x00', @random="feed0bfb1160", [0xff, 0xff, 0x0, 0x0, 0xff], @local, [0xff, 0x0, 0x0, 0xff, 0xff], 0x110, 0x180, 0x1b0, [@arp={'arp\x00', 0x38, {{0x323, 0x8100, 0x1, @empty, 0xff, @remote, 0x0, @empty, [0xff, 0xff, 0xff, 0xff], @dev={[], 0xc}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], 0xaa, 0xc}}}, @connbytes={'connbytes\x00', 0x18, {{0x40, 0x1, 0x2, 0x1}}}]}, [@snat={'snat\x00', 0x10, {{@random="40b568487005", 0xfffffffffffffffd}}}, @snat={'snat\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, 0xfffffffffffffffe}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x2}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x40, 0x8848, 'veth0_to_team\x00', 'nr0\x00', '\x00', 'vlan0\x00', @broadcast, [0xff, 0xff, 0x0, 0xff], @broadcast, [0xff, 0x0, 0x0, 0x0, 0xff, 0xff], 0x70, 0xe0, 0x118}, [@common=@dnat={'dnat\x00', 0x10, {{@broadcast, 0xffffffffffffffff}}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}]}, @arpreply={'arpreply\x00', 0x10, {{@remote, 0xffffffffffffffff}}}}]}]}, 0x538) 18:42:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000050c0), 0xfffffeaa) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:42:11 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x0, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498f46e9a57a4", &(0x7f0000000180), 0x6}, 0xc) 18:42:12 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x0, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000240)="ddd1d16c0db4b4ce176260df4ab38d622a3a002fd09a9644973652e8fd732b623c828b82c24d0ceb3bdafdffc70562", &(0x7f0000000280)="0b57ed616a2f9aa9908c87aa78ac4a1f128af55c9f1c99a73edeba2c45f30f7a32ee5fc1c7b1545fd92f1ae25b3f38269442397bf056eb60dcefa6211f0de1ef3f99c03d76f87bc6e13b767d196d17dcf9c19f5949d8283249ca05c42c11bde78638aa855bdb02ee090d674000e0dae1e7fa48af782996835d250824abfb2c58", 0x2}, 0x20) 18:42:12 executing program 7: setrlimit(0xf, &(0x7f0000000040)={0x9, 0x4d}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000100)=ANY=[@ANYBLOB="03000000d10000004233ac63fe787113f3fb1ffce797b135cd04fd4b4a5d580f33f6c1508c39f49c9a3078034a742b012ddef485a6803b0eacda2215084beee1b85c48c02ad2e54fd62b6a606270cdcc8bbf5807288d8ac9728d3428cd9418d7c9061b0e3533e958f577969037a41e0d53dd618c4f516af41e8c5b5c039f9f7e90e737eddc7aaae43740913b075b4f9d3c7199d8ecb4fd6e808b9928630af1db4c3000b783c72f97038312ff26ae35a4fa992deae4b388fe64e064df25308a3a77fdf43e9d1debe80436413a89f8"]) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x100000000}, &(0x7f0000001240)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000001280)={r1, 0x9, 0x5, [0x80, 0x8, 0x8, 0x132, 0x479]}, 0x12) read$FUSE(r0, &(0x7f0000000240), 0x1000) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r2, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) fcntl$getflags(r2, 0x404) 18:42:12 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) r1 = dup(r0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000280)=@assoc_value={0x0}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000300)={r2, 0x10000}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x1f}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000180)={r3, @in={{0x2, 0x0, @remote}}}, 0x84) 18:42:12 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x0, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498f46e9a57a4", &(0x7f0000000180), 0x6}, 0xc) 18:42:12 executing program 3: openat$audio(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/audio\x00', 0x7, 0x0) 18:42:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f91583d30d79852ca3ec45eb8cc1fed1c0c99f74b303030303034303030673030303030303034303030302c7570a9e15b69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = getpid() sched_getscheduler(r1) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffff9c}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @local}}, 0x9c, 0x7fffffff, 0xff, 0x4, 0x4}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000180)={r3, 0xb5, 0xf1, 0x775, 0x7, 0x55e03fd3}, &(0x7f00000001c0)=0x14) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:42:12 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000080)=0xe8) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r0, &(0x7f0000000440)={0x90, 0x0, 0x8, {0x3, 0x3, 0x4, 0x1d43, 0x1, 0xffffffff, {0x6, 0x4, 0x240, 0xff, 0x9, 0x8, 0x4, 0x40, 0x4, 0x200, 0x6, r1, r2, 0x3, 0x7a1206dc}}}, 0x90) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3}, 0x90) 18:42:12 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x0, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000240)="ddd1d16c0db4b4ce176260df4ab38d622a3a002fd09a9644973652e8fd732b623c828b82c24d0ceb3bdafdffc70562", &(0x7f0000000280)="0b57ed616a2f9aa9908c87aa78ac4a1f128af55c9f1c99a73edeba2c45f30f7a32ee5fc1c7b1545fd92f1ae25b3f38269442397bf056eb60dcefa6211f0de1ef3f99c03d76f87bc6e13b767d196d17dcf9c19f5949d8283249ca05c42c11bde78638aa855bdb02ee090d674000e0dae1e7fa48af782996835d250824abfb2c58", 0x2}, 0x20) 18:42:12 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:42:12 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x0, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498f46e9a57a4", &(0x7f0000000180), 0x6}, 0xc) 18:42:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x400000, 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000000c0), &(0x7f0000000180)=0x8) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=000000000\x000=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x12) read$FUSE(r1, &(0x7f00000030c0), 0xfb5) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:42:12 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000008c0)=""/4096, &(0x7f0000000000)=0x1000) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x2d4) 18:42:12 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20480) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80000, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000001c0)=0xf2a, 0x4) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) sched_getparam(r3, &(0x7f0000000340)) membarrier(0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000240)={0x0, 0x3, 0x9, 0x6, 0xfff, 0xfff, 0x8, 0x6, {0x0, @in={{0x2, 0x4e21, @broadcast}}, 0xe7c, 0x100000000, 0x8, 0x3, 0x6}}, 0xfffffffffffffffd) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000100)={r4, 0x3, 0x6, 0x8000}, &(0x7f0000000180)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:42:12 executing program 7: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x6, 0x0, 0x9, 0x7, 0x101, 0x6, 0x3, {0x0, @in={{0x2, 0x4e21, @multicast1}}, 0x8, 0x2, 0x44, 0x20, 0x1}}, &(0x7f0000000040)=0xb0) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000080)={r1, 0xffffffff00000000, 0x7, 0x4}, 0x10) ioctl$TUNSETLINK(r0, 0x400454cd, 0x200) unshare(0x20400) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000240)={0x6, {{0xa, 0x4e21, 0xbc, @local, 0xffffffffffffff9d}}, {{0xa, 0x4e21, 0xffffffffffffff01, @mcast1, 0xad}}}, 0x108) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r2 = getegid() ioctl$TUNSETGROUP(r0, 0x400454ce, r2) 18:42:12 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000240)="ddd1d16c0db4b4ce176260df4ab38d622a3a002fd09a9644973652e8fd732b623c828b82c24d0ceb3bdafdffc70562", &(0x7f0000000280)="0b57ed616a2f9aa9908c87aa78ac4a1f128af55c9f1c99a73edeba2c45f30f7a32ee5fc1c7b1545fd92f1ae25b3f38269442397bf056eb60dcefa6211f0de1ef3f99c03d76f87bc6e13b767d196d17dcf9c19f5949d8283249ca05c42c11bde78638aa855bdb02ee090d674000e0dae1e7fa48af782996835d250824abfb2c58", 0x2}, 0x20) 18:42:12 executing program 3: openat$audio(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/audio\x00', 0x0, 0x0) [ 523.104397] Unknown ioctl 1074025677 [ 523.131073] IPVS: length: 4096 != 8 [ 523.152603] Unknown ioctl 1074025678 [ 523.158054] kernel msg: ebtables bug: please report to author: Wrong len argument [ 523.182751] IPVS: length: 4096 != 8 [ 523.195777] Unknown ioctl 1074025677 [ 523.202471] kernel msg: ebtables bug: please report to author: Wrong len argument 18:42:13 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x0, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498f46e9a57a4", &(0x7f0000000180), 0x6}, 0xc) 18:42:13 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000000)={0x3, "cb31d6ccc2b60b21d2e1582521db1a42f878d5129144f20507f4fcf14f97ff1ba54c8b9a4e7e0322de0b07b28b690680b7bf69c326fc0d7b55220d9e8c4ed96f7039b1bc6220d0ec2433c9c868eba176ddc253ca024c61094d4aadc7528ba205eed1d7cccff7a82bdfb177573bc24822"}, 0x78, 0x800) 18:42:13 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000240)="ddd1d16c0db4b4ce176260df4ab38d622a3a002fd09a9644973652e8fd732b623c828b82c24d0ceb3bdafdffc70562", &(0x7f0000000280)="0b57ed616a2f9aa9908c87aa78ac4a1f128af55c9f1c99a73edeba2c45f30f7a32ee5fc1c7b1545fd92f1ae25b3f38269442397bf056eb60dcefa6211f0de1ef3f99c03d76f87bc6e13b767d196d17dcf9c19f5949d8283249ca05c42c11bde78638aa855bdb02ee090d674000e0dae1e7fa48af782996835d250824abfb2c58", 0x2}, 0x20) 18:42:13 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getgid() mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x2000, &(0x7f0000000540)=ANY=[@ANYBLOB="8f3d037d105862c4d1b53d68566dec667ec11addcc0f47b98e083268af50680d93b4767a3a95df1f933577913899ca185c05cc4184cb36e389f5d6b5fc95acbbd2a0144a985ab37eb230964d475eb0acf9341900c931be034366b245b582f2e886c6f2413f007617d1a0c9039d9901d533551aa78849", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',blksize=0x0000000000001200,allow_other,\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0xffffffe8) 18:42:13 executing program 3: openat$audio(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/audio\x00', 0x0, 0x0) 18:42:13 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x8980, 0x0) ioctl$VT_RELDISP(r1, 0x5605) 18:42:13 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0xfffffffffffffec7) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x8) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000000c0)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3}, 0x90) 18:42:13 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) r1 = accept4(r0, &(0x7f0000000000), &(0x7f0000000080)=0x80, 0x800) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000180)={0xfffffffffffffff9}, 0x1) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000001c0)={0x0, 0x81, 0xff}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={r2, @in={{0x2, 0x4e23, @loopback}}}, &(0x7f0000000300)=0x84) 18:42:13 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498f46e9a57a4", &(0x7f0000000180), 0x6}, 0xc) 18:42:13 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000240)="ddd1d16c0db4b4ce176260df4ab38d622a3a002fd09a9644973652e8fd732b623c828b82c24d0ceb3bdafdffc70562", &(0x7f0000000280)="0b57ed616a2f9aa9908c87aa78ac4a1f128af55c9f1c99a73edeba2c45f30f7a32ee5fc1c7b1545fd92f1ae25b3f38269442397bf056eb60dcefa6211f0de1ef3f99c03d76f87bc6e13b767d196d17dcf9c19f5949d8283249ca05c42c11bde78638aa855bdb02ee090d674000e0dae1e7fa48af782996835d250824abfb2c58", 0x2}, 0x20) 18:42:13 executing program 3: openat$audio(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/audio\x00', 0x0, 0x0) 18:42:13 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:42:13 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x204000, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) 18:42:13 executing program 7: getegid() r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x4000, 0x0) inotify_add_watch(r1, &(0x7f00000001c0)='./file0\x00', 0x80) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f0000000240)={{0x7f, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e21, 0x1, 'wrr\x00', 0x2, 0x5, 0x16}, {@broadcast, 0x4e21, 0x2000, 0x35a, 0x200, 0x2}}, 0x44) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x410000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000002c0)=[{0x3, 0x3}, {0x7, 0x4}, {0x2, 0x1}, {0x4, 0x3}, {0xc, 0x200}, {0xc, 0x101}, {0xc, 0x4}, {0x3, 0xfff}, {0xf, 0x5}], 0x9) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x80) fanotify_mark(r2, 0x8, 0x21, r3, &(0x7f0000000140)='./file0\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'U-', 0x2745c231}, 0x28, 0x3) unshare(0x200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:42:14 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498f46e9a57a4", &(0x7f0000000180), 0x6}, 0xc) 18:42:14 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000100)={0x18, 0x1, 0x0, {0x3}}, 0x18) openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) unshare(0x20400) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x8, 0x100) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000040)={0xfffffffffffffffb, 0x0, 0x6, @link_local, 'lo\x00'}) 18:42:14 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000240)="ddd1d16c0db4b4ce176260df4ab38d622a3a002fd09a9644973652e8fd732b623c828b82c24d0ceb3bdafdffc70562", &(0x7f0000000280)="0b57ed616a2f9aa9908c87aa78ac4a1f128af55c9f1c99a73edeba2c45f30f7a32ee5fc1c7b1545fd92f1ae25b3f38269442397bf056eb60dcefa6211f0de1ef3f99c03d76f87bc6e13b767d196d17dcf9c19f5949d8283249ca05c42c11bde78638aa855bdb02ee090d674000e0dae1e7fa48af782996835d250824abfb2c58", 0x2}, 0x20) 18:42:14 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x2a0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x4e20, 0x100, @local, 0xfff}}, 0x41, 0x1}, &(0x7f0000000040)=0x90) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000080)={r2, 0x0, 0xfffffffffffffff9}, 0x8) 18:42:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x6, 0xd, 0x14, 0x10, "888e3d2fd6f263fb4ca621f411c3f9c87ada16b2e1b9e85e19d9a9ed9d42cbeb3ecbbacec3d4bbefc98cba756caadd66304dff7a8c3428b4bd16edda317f6ef8", "e1304d035de4d8e059076dda70b07cb2766fdc44e437d1afcccbc1ea414c4878", [0x0, 0x3]}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x3, 0x42808, 0x80000000000000, 0x200}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r2, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r2, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r2, &(0x7f0000001000), 0x1066) write$FUSE_ENTRY(r2, &(0x7f0000003000)={0x90, 0x0, 0x3}, 0x90) [ 524.370456] kernel msg: ebtables bug: please report to author: Wrong len argument [ 524.430349] kernel msg: ebtables bug: please report to author: Wrong len argument 18:42:14 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x80000) mkdirat(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x3ffe}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000001000), 0x1000) lseek(r1, 0x0, 0x6) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f00000030c0), 0x1000) write$binfmt_elf32(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x10000, 0x0, 0xffffffff80000001, 0x9, 0x2, 0x0, 0x9, 0x188, 0x38, 0x313, 0x6, 0x7, 0x20, 0x1, 0x8, 0xa741, 0x2}, [{0x2, 0x7fffffff, 0x10001, 0x6, 0x9, 0x9, 0x1, 0x1000}, {0x6474e557, 0x6, 0x3, 0x1, 0x1000, 0x7, 0x1, 0x8}], "7ce2745865bd0a30901362c153c6c684469ef0e71960f281d7bb572a092f25e694c8e4379bfd976444989cf2c73334bafd72ab07648b2770bb94b2", [[], [], [], [], []]}, 0x5b3) write$FUSE_INTERRUPT(r1, &(0x7f0000000080)={0x10, 0xffffffffffffffdf, 0x2}, 0x159) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e23, 0x80000000, @mcast1, 0x2}}, 0x6, 0xffffffffffffffff, 0x8, 0x8, 0x50}, &(0x7f0000000000)=0x98) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={r2, 0x1}, 0x8) 18:42:14 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498f46e9a57a4", &(0x7f0000000180), 0x6}, 0xc) 18:42:14 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000100)="bedcea7c18a1f6d5f08b41adea7b07449fb3e26253f7dc67103e7948f2e28da797fe9f6f4f962312d604389df47eb75173c8f36c1a194c0804dcc5e7d165142ef45503a4c38ae25ac8e3c821cbf8c8e971d727c4a119b4e300b59321857a56b92cf19fb51d5d9a006e30391a7d7acbfbcc3df131da1cf901a7971b2860147783f520d980d7b9b021871294360bf3a77775057b5ed9287fe203f843fe090aedd08612eab0c19a05485dda05d5ca8506bfa8375166cac9eca606f60846929e0f01e90281e358b56118224908", 0x2}, 0x20) 18:42:14 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000240)="ddd1d16c0db4b4ce176260df4ab38d622a3a002fd09a9644973652e8fd732b623c828b82c24d0ceb3bdafdffc70562", &(0x7f0000000280)="0b57ed616a2f9aa9908c87aa78ac4a1f128af55c9f1c99a73edeba2c45f30f7a32ee5fc1c7b1545fd92f1ae25b3f38269442397bf056eb60dcefa6211f0de1ef3f99c03d76f87bc6e13b767d196d17dcf9c19f5949d8283249ca05c42c11bde78638aa855bdb02ee090d674000e0dae1e7fa48af782996835d250824abfb2c58", 0x2}, 0x20) 18:42:14 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x3, 0x400200) openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:42:14 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000000c0)) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3}, 0x90) 18:42:14 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x0, 0x5}, 0x8) 18:42:14 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400300, 0x0) epoll_pwait(r1, &(0x7f0000000040)=[{}, {}], 0x2, 0x8, &(0x7f0000000080)={0x39da}, 0x8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000008c0)=@nat={'nat\x00', 0x19, 0x4, 0x4c0, [0x200001c0, 0x0, 0x0, 0x200002b0, 0x20000538], 0x0, &(0x7f0000000180), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x10, 0x88f7, 'veth1_to_bridge\x00', 'ipddp0\x00', 'bond_slave_0\x00', 'sit0\x00', @local, [0xff, 0x0, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@log={'log\x00', 0x28, {{0x55, "90eb50b0fcacc899cc7b6c568026d284238a35771efd17d86cdec962a3fa", 0x6}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x2, [{{{0x11, 0x0, 0xe8e7, 'ip_vti0\x00', 'veth1_to_team\x00', 'bond_slave_1\x00', 'ip6gre0\x00', @remote, [0xff, 0xff, 0xff, 0xff], @random="06baeb237761", [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@link_local, 0xfffffffffffffffd}}}}, {{{0x9, 0x10, 0x6558, 'erspan0\x00', 'ip_vti0\x00', 'bond_slave_1\x00', 'nr0\x00', @random="feed0bfb1160", [0xff, 0xff, 0x0, 0x0, 0xff], @local, [0xff, 0x0, 0x0, 0xff, 0xff], 0x110, 0x180, 0x1b0, [@arp={'arp\x00', 0x38, {{0x323, 0x8100, 0x1, @empty, 0xff, @remote, 0x0, @empty, [0xff, 0xff, 0xff, 0xff], @dev={[], 0xc}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], 0xaa, 0xc}}}, @connbytes={'connbytes\x00', 0x18, {{0x40, 0x1, 0x2, 0x1}}}]}, [@snat={'snat\x00', 0x10, {{@random="40b568487005", 0xfffffffffffffffd}}}, @snat={'snat\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, 0xfffffffffffffffe}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x2}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x40, 0x8848, 'veth0_to_team\x00', 'nr0\x00', '\x00', 'vlan0\x00', @broadcast, [0xff, 0xff, 0x0, 0xff], @broadcast, [0xff, 0x0, 0x0, 0x0, 0xff, 0xff], 0x70, 0xe0, 0x118}, [@common=@dnat={'dnat\x00', 0x10, {{@broadcast, 0xffffffffffffffff}}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}]}, @arpreply={'arpreply\x00', 0x10, {{@remote, 0xffffffffffffffff}}}}]}]}, 0x538) 18:42:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:42:14 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498f46e9a57a4", &(0x7f0000000180), 0x6}, 0xc) 18:42:14 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = dup3(r0, r0, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000006c0)={0x0, @empty, @loopback}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000840)={{{@in=@broadcast, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000940)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000a80)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000a40)={&(0x7f0000000980)=@mpls_newroute={0xb8, 0x18, 0x2, 0x70bd28, 0x25dfdbfc, {0x1c, 0x0, 0x0, 0x2, 0xff, 0x3, 0xfd, 0x5, 0x1000}, [@RTA_DST={0xc, 0x1, [{0x100000000, 0xfffffffffffffffa, 0x3, 0x6}, {0xfff, 0x401, 0x7, 0x2}]}, @RTA_OIF={0x8, 0x4, r2}, @RTA_DST={0x28, 0x1, [{0x1000, 0x9, 0x2, 0x2}, {0x1000, 0x6, 0x6, 0x1f}, {0xcaa, 0x8, 0x3f, 0x20}, {0xfff, 0x9, 0x5f, 0x3}, {0x8000, 0x10000, 0x20, 0x100000000}, {0x44, 0x8, 0x80000000, 0x9}, {0x9c31, 0x831, 0x4, 0xced}, {0x3f, 0x10001, 0x2, 0x200}, {0x3, 0x119, 0x4c3b, 0x7}]}, @RTA_OIF={0x8, 0x4, r3}, @RTA_DST={0x28, 0x1, [{0x1f, 0x7, 0xfffffffffffffeff, 0xd3}, {0xffff, 0x3, 0x80, 0x1}, {0xfff, 0x3, 0x3, 0x2}, {0x0, 0x86f5, 0x80000001, 0xec6}, {0xffffffff, 0x7fff, 0x7, 0xfffffffffffffe01}, {0x3, 0x40, 0x30dd2dcb, 0xe339}, {0x5147, 0x61, 0x1, 0x800}, {0x439d325e, 0x26f, 0x2, 0xffffffffffff9f0a}, {0x0, 0x8, 0x8, 0x5}]}, @RTA_DST={0x10, 0x1, [{0x7, 0x0, 0x3, 0x4}, {0x8, 0x2, 0xc9c, 0x7}, {0x2, 0x5, 0x9, 0x2}]}, @RTA_DST={0x20, 0x1, [{0x4, 0x5, 0x0, 0x1}, {0x6930, 0xb87f, 0x1, 0x3}, {0x2000000000, 0xffffffffffffffeb, 0x3bb8, 0x7}, {0xfffffffffffffffc, 0x2, 0x9, 0xb37}, {0x1, 0x6, 0x1, 0x1}, {0x3, 0x101}, {0x7f, 0x0, 0x6, 0x3}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r4 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x18) inotify_rm_watch(r1, r4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000100)="d76a8af3ebfd96cb930d5e52abad5949a987a0e47f8f01bc1a68558da00cdea42abdbf8899f9ef31185a5be75ec39b353f2b4a0a7f598d41e35433e61083b1bb256cbaf73cded4868e684988047c4c11b2bf4384210694b34d764dbc76adabaae02ac924cbdeb9c38e117c7af2a03e20b50e7a6acaeb102cd6e70eca7109a259d83dbcefa09e891f200bbc22e440be210dde3660b106605c", &(0x7f0000000240)="80f5fa1121eaa7490234b61402d23d9f1a8e33d002ce535c56bbcee9ec4f07e041b58cbf9c753a4f59b8e7cf8e4295513fec5501dc97494601ca44792ae8d7d5052bee018200ec47b6939d59a7f971fe2458623e8390cd7d5fcb874975eaeb830fd253878a907c0bb049339d355768d4da1298c4c53e8a62ab9e31f5f6c85010337e1c536e1f53f04c8f3e37201d574c743e776d97015735662b4e58011d3a10e81e73", 0x3}, 0x20) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000640)='lp\x00', 0x3) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000600)=0x1, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000300)="3ea7ad30a92bc983f77c040787748f98bf4014d09972f12539ed6a7aa33685d91275b0e3c1247106e4f6514292598d19ddf80012b2403e80642a4b3c682114fe01f30533ad5a981b36cbec2a2e68d3d9b0efc26d27c191623c051ed3812df7d02eec4bed1cbd4cd7b7d4e4e0908d440bd4324ab1fa", &(0x7f0000000380)="c6f349e0daf11c8118a3195031c264ee214ee48987d6c4f269974a5fec6d676788b59fadd985d05346aabe75d543fb8485c74b5f902edfdbc34c895a6a8d93198fb3e6fa25454fe171e36dd7497aaa20e38701a39cd388d44996cf1bb105a07becdb196a71aeb34ec398e05ee567aa3ea899e65df203d3bfd2a824c447340bd3495e644dfa8921602d751f9c782aac7cadf1dda1075d427a6570c0078b918a8c1f2cbc305291f3e826002368047f8274d6f512d7359a7363ad9804192d4929ed52f6a8118617", 0x3}, 0x20) sendto$inet(r1, &(0x7f0000000480)="274d385a5681fba49933beeaddc5aa7bf1329a0495dd5b9070ce95594d0c57a93ea28c96d9e2c317f03e4b6c31c72d547ab780d8e8def129dc25d2951b7557ef4b5198bf231c38e5dd9192db56e651402e23f427252adafc333eb723d5ed53c614305186625e95a592f82454ee3460306fb8811a12b4d241dcd9ed3b19ddded56dd20c5e6618cf21fc9f0f1dbe81bb9fc0d8f402766b957522f7e6ebf8f04832bf7943036dd871bf9da104b4c87075", 0xaf, 0x4c000, &(0x7f0000000540)={0x2, 0x4e21, @multicast1}, 0x10) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000580)={0x0, @speck128}) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000040)) 18:42:15 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498f46e9a57a4", &(0x7f0000000180), 0x6}, 0xc) 18:42:15 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x2, 0x1db, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f0000000000), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x253) 18:42:15 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000240)="ddd1d16c0db4b4ce176260df4ab38d622a3a002fd09a9644973652e8fd732b623c828b82c24d0ceb3bdafdffc70562", &(0x7f0000000280)="0b57ed616a2f9aa9908c87aa78ac4a1f128af55c9f1c99a73edeba2c45f30f7a32ee5fc1c7b1545fd92f1ae25b3f38269442397bf056eb60dcefa6211f0de1ef3f99c03d76f87bc6e13b767d196d17dcf9c19f5949d8283249ca05c42c11bde78638aa855bdb02ee090d674000e0dae1e7fa48af782996835d250824abfb2c58", 0x2}, 0x20) 18:42:15 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xdf, 0x200000) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:42:15 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x2000, 0x0) mkdirat(r0, &(0x7f0000000ac0)='./file0/file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d303030303030303034303030302c757365725f6933c0f7675f4ff6a78cf9314e643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dsp\x00', 0x40040, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @local, @loopback}, &(0x7f0000000680)=0xc) stat(&(0x7f00000006c0)='./file0/file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000780)={{{@in=@multicast2, @in=@remote, 0x4e24, 0x5, 0x4e23, 0x4, 0x2, 0x80, 0x20, 0x29, r3, r4}, {0x5260, 0x4, 0x7f, 0x7, 0x7, 0x400, 0x3, 0x1}, {0x14, 0x0, 0x8, 0x1}, 0xab24, 0x6e6bba, 0x2, 0x0, 0x2}, {{@in=@local, 0x4d3, 0xff}, 0xa, @in6=@loopback, 0x34ff, 0x0, 0x3, 0x8, 0x81, 0x1, 0x6b59}}, 0xe8) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f00000030c0), 0x1000) readv(r2, &(0x7f0000000180)=[{&(0x7f0000000340)=""/163, 0xa3}, {&(0x7f0000000400)=""/252, 0xfc}, {&(0x7f0000000540)=""/171, 0xab}, {&(0x7f0000000080)=""/44, 0x2c}, {&(0x7f0000000880)=""/225, 0xe1}], 0x5) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x100}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000980)={r5, 0x2, 0xbe61}, 0x8) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r1, &(0x7f0000003000)={0x90, 0x0, 0x3}, 0x90) 18:42:15 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x800001ff) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:42:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) [ 525.326918] kernel msg: ebtables bug: please report to author: entries_size too small 18:42:15 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x264fe1e55ee0117f, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f0000000340)={0x3, 0x4}) r2 = creat(&(0x7f0000000080)='./file0\x00', 0xb) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x4, 0x9, 0x7, 0xda}, &(0x7f0000000180)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f00000001c0)={r3, 0xbb}, 0x8) madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3}, 0x90) 18:42:15 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000240), &(0x7f0000000280)="0b57ed616a2f9aa9908c87aa78ac4a1f128af55c9f1c99a73edeba2c45f30f7a32ee5fc1c7b1545fd92f1ae25b3f38269442397bf056eb60dcefa6211f0de1ef3f99c03d76f87bc6e13b767d196d17dcf9c19f5949d8283249ca05c42c11bde78638aa855bdb02ee090d674000e0dae1e7fa48af782996835d250824abfb2c58", 0x2}, 0x20) 18:42:15 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498f46e9a57a4", &(0x7f0000000180), 0x6}, 0xc) 18:42:15 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000740)=0xfe43) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000780)=0x280, 0x4) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x3, 0x368, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000180], 0x0, &(0x7f00000000c0), &(0x7f00000007c0)=ANY=[@ANYBLOB="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"]}, 0x49a) r1 = memfd_create(&(0x7f0000000180)='broute\x00', 0x1) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0)=0x22b, 0x4) pipe2(&(0x7f00000006c0)={0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_GET_EVENT(r4, &(0x7f0000000400)={0xc, 0x8, 0xfa00, {&(0x7f0000000280)}}, 0x10) r5 = openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000680)={0xc, 0x8, 0xfa00, {&(0x7f0000000500)}}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r5, 0x0, 0x486, &(0x7f0000000200), &(0x7f0000000240)=0xc) 18:42:15 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080)="2c1c0530730b8c7306f82e96b951066c677e79", &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:42:15 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f0000000000)="e3181ef926c200231879b9e80e9817784f6a563de509a44e97d43db6528a5f37f254c9d04dfd3fd0dd10e299f39a4c8783c30f22d8d580bf17175082b1427387178e7996c1111e99e9ded418b33bc828636333c27b", &(0x7f0000000100)=""/231}, 0x18) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) [ 525.679922] kernel msg: ebtables bug: please report to author: Wrong len argument 18:42:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x4, 0x80000) mkdirat(r0, &(0x7f00000001c0)='./file0/file0\x00', 0x8) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="a720"]) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r1, &(0x7f0000000080)={0x50, 0xffffffffffffffda, 0x3, {0x7, 0x1b, 0xb3fe, 0x20004, 0x10000, 0x7ff, 0x1ff, 0x7}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) [ 525.780445] kernel msg: ebtables bug: please report to author: Wrong len argument 18:42:15 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000240), &(0x7f0000000280), 0x2}, 0x20) 18:42:15 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100), &(0x7f0000000180), 0x6}, 0x20) 18:42:16 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653df8ffffffffffffff3030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f00000002c0), 0x80800) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000003c0)={@local, @dev={0xfe, 0x80, [], 0x18}, @local, 0xffffffff, 0x0, 0x7ff, 0x500, 0x3, 0x0, r2}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000180)='squashfs\x00', 0x8000, &(0x7f00000001c0)='%\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3}, 0x90) 18:42:16 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) r1 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0xc34d, 0x80000) r2 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000140)={r2}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:42:16 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x800fffe) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:42:16 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000000)={'raw\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) 18:42:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0xae90, 0x20000) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000340)="32c7b2b549c1e02f30f4252bc90a22f3ee29e25282fc268985a6240606b31f0d2636dcc2c5b1114e9f6406319e2cd0daf897ecc0e11650be665c058043c99a73413a0da1ff902eedeabcabcf3faa35c8fe780a16a8606b40247adb093f3a51e223c892e203d90ba463d990067b3f428d0fdd34e527cc7316c9f441baf3d05e6e0259464178b0f347f8400263cd8fa74e01e2fdcbc6babb0fcc7f35639077e56f30c6c9a400e1569da6b196862c60350a71cdce99afa52efadab187af1bb1f8a712f791ca758b67dc669ac69a7dd75c228bd7a91c81e127b856a9b9e6a0f8") r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x64400, 0x0) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f00000000c0)={0x0, 0x13b99a28}) 18:42:16 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x2000, 0x0) mkdirat(r0, &(0x7f0000000ac0)='./file0/file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d303030303030303034303030302c757365725f6933c0f7675f4ff6a78cf9314e643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dsp\x00', 0x40040, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @local, @loopback}, &(0x7f0000000680)=0xc) stat(&(0x7f00000006c0)='./file0/file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000780)={{{@in=@multicast2, @in=@remote, 0x4e24, 0x5, 0x4e23, 0x4, 0x2, 0x80, 0x20, 0x29, r3, r4}, {0x5260, 0x4, 0x7f, 0x7, 0x7, 0x400, 0x3, 0x1}, {0x14, 0x0, 0x8, 0x1}, 0xab24, 0x6e6bba, 0x2, 0x0, 0x2}, {{@in=@local, 0x4d3, 0xff}, 0xa, @in6=@loopback, 0x34ff, 0x0, 0x3, 0x8, 0x81, 0x1, 0x6b59}}, 0xe8) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f00000030c0), 0x1000) readv(r2, &(0x7f0000000180)=[{&(0x7f0000000340)=""/163, 0xa3}, {&(0x7f0000000400)=""/252, 0xfc}, {&(0x7f0000000540)=""/171, 0xab}, {&(0x7f0000000080)=""/44, 0x2c}, {&(0x7f0000000880)=""/225, 0xe1}], 0x5) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x100}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000980)={r5, 0x2, 0xbe61}, 0x8) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r1, &(0x7f0000003000)={0x90, 0x0, 0x3}, 0x90) 18:42:16 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100), &(0x7f0000000180), 0x6}, 0x20) 18:42:16 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000240), &(0x7f0000000280)}, 0x20) 18:42:16 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1000005, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x9, 0x60080) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r3 = dup2(r0, r0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x200, 0x0) r6 = syz_open_dev$audion(&(0x7f0000003840)='/dev/audio#\x00', 0x5, 0x20040) pipe2(&(0x7f0000003880)={0xffffffffffffffff}, 0x80000) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f00000039c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40020}, 0xc, &(0x7f0000003980)={&(0x7f00000038c0)={0xa4, r2, 0x0, 0x70bd2d, 0x25dfdbfe, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x6}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xff}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x8001}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x3}, @NBD_ATTR_SOCKETS={0x34, 0x7, [{0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r0}, {0x8, 0x1, r7}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:42:16 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c005dcfa5d2add59959aba792a0e03dc4f2fe6e949d54e5934ca46d6b1fd6e4d754d979ca175e3901c4d01a42831b28b7e3ac0edd564f44a3eecd48009f3d63b4f9711f580ddafdc6266858611785af0782af77bbf0162add35a90ac9caf0e18b3fc9feee7fb6697a84a15dcaa2a062d7414dddd0610e75fdc5c71b1b548de93501bcfb2641c764b51fbffa4550c25ffe5cbc0a"]) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x100) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x1f, 0x7fff, 0x101, 0x10001, 0x5}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000001c0)={r2, 0x7e}, &(0x7f0000000240)=0x8) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3}, 0x90) 18:42:16 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) fsync(r0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x9, 0x80) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) 18:42:16 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2080, 0x44) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000040)={0x2, 0x8000, 0xfffffffffffffffb}) 18:42:16 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100), &(0x7f0000000180), 0x6}, 0x20) 18:42:16 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000240), &(0x7f0000000280)}, 0x20) 18:42:16 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@empty, @remote, 0x1, 0x7, [@multicast1, @remote, @remote, @broadcast, @local, @empty, @loopback]}, 0x2c) 18:42:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x4000, 0x2}, 0x10) 18:42:17 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x0, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='security.capability\x00', &(0x7f00000000c0)=""/23, 0x17) unshare(0x20404) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:42:17 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x600000, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000001c0)={r2, 0x5}, 0xfffffd68) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) setrlimit(0x4, &(0x7f0000000180)={0x2, 0x3}) 18:42:17 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0xd70c, 0x315100) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000340)) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3}, 0x90) 18:42:17 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x5, 0xfffffffffffffe00, 0x3f, 0x5, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000300)={0x0, @aes256}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x100, 0x0) mq_timedreceive(r1, &(0x7f0000000240)=""/82, 0x52, 0x8001, &(0x7f00000002c0)={0x0, 0x1c9c380}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0x0, 0xfd, 0x10}, 0xc) bind(r1, &(0x7f0000000340)=@rc={0x1f, {0x3, 0x9, 0xffffffffffffffff, 0x2, 0x4, 0xfffffffffffffffd}, 0xfffffffffffff000}, 0x80) 18:42:17 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd44408", &(0x7f0000000180), 0x6}, 0x20) 18:42:17 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x2000, 0x0) mkdirat(r0, &(0x7f0000000ac0)='./file0/file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d303030303030303034303030302c757365725f6933c0f7675f4ff6a78cf9314e643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dsp\x00', 0x40040, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @local, @loopback}, &(0x7f0000000680)=0xc) stat(&(0x7f00000006c0)='./file0/file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000780)={{{@in=@multicast2, @in=@remote, 0x4e24, 0x5, 0x4e23, 0x4, 0x2, 0x80, 0x20, 0x29, r3, r4}, {0x5260, 0x4, 0x7f, 0x7, 0x7, 0x400, 0x3, 0x1}, {0x14, 0x0, 0x8, 0x1}, 0xab24, 0x6e6bba, 0x2, 0x0, 0x2}, {{@in=@local, 0x4d3, 0xff}, 0xa, @in6=@loopback, 0x34ff, 0x0, 0x3, 0x8, 0x81, 0x1, 0x6b59}}, 0xe8) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f00000030c0), 0x1000) readv(r2, &(0x7f0000000180)=[{&(0x7f0000000340)=""/163, 0xa3}, {&(0x7f0000000400)=""/252, 0xfc}, {&(0x7f0000000540)=""/171, 0xab}, {&(0x7f0000000080)=""/44, 0x2c}, {&(0x7f0000000880)=""/225, 0xe1}], 0x5) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x100}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000980)={r5, 0x2, 0xbe61}, 0x8) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r1, &(0x7f0000003000)={0x90, 0x0, 0x3}, 0x90) 18:42:17 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101040, 0x0) write$FUSE_POLL(r1, &(0x7f0000000100)={0x18, 0x0, 0x1, {0x28}}, 0x18) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r0) unshare(0x20400) connect$vsock_dgram(r2, &(0x7f0000000040), 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:42:17 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000240), &(0x7f0000000280)}, 0x20) 18:42:17 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x5c, r2, 0x805, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xbd7}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x800}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) 18:42:17 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x5, 0x40000) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000180)={0x18, 0x0, {0xffffffffffffffc1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}) r2 = memfd_create(&(0x7f0000000080)='/dev/vsock\x00', 0x1) write$tun(r2, &(0x7f0000000240)={@val={0x0, 0x600}, @void, @eth={@random="0b60c61990f9", @dev={[], 0x1c}, [{[{0x9100, 0x1, 0x1}], {0x8100, 0x7f, 0x3, 0x1}}], {@mpls_mc={0x8848, {[{0x5c, 0x9, 0x6, 0x7f}, {0xa8, 0x7, 0x7, 0x200}, {0x81, 0x5, 0x2, 0x3ff}, {0x80000000, 0x8, 0xba8, 0x8}, {0x1f, 0x7, 0x10000, 0x9}, {0x6, 0x4, 0x8, 0xfff}], @generic="56ef9295b71ea184ab228255281047043bc3ed1f808c8fce95441f0d7bdfc97ff6c6babb15693e6c013461558857df99ce5dec26478630af7b6582fc45ccde8bb9a0a5235b5bd6da6e55db6b5aa4ba9badd30c205ea4e590030db802179b9de4bfa6b9c338c71844cf6b28baacd72abdcd4f93e8d73dc49a3f1a9c17623a54d1bbe6ef77771f05318df57ba60a3bba6124066bed088bfe6045fa2362973f19b944344c6872ce366a4039fdfd09f24eadc4e03d7483721db8c5d67ceb5dca38898658c0dd768c203ac4ddb21d386949e0d667dd52dde159171bc10db0ce5f32e0640c35234e392837e0cb480fcf9021744a0453a1e35e22f134a4644ed5d3252f92b1983d2f18851d29511050def5451e3bfc66c27cd97bad1e41a757d3ed9f2c20ebcec6a6c57917a183723a9fbada7285d82e4fa90446f3b34817ae330c7ca82892273932108f6eea6283b5af61bd67aa22945b65f82b61d2c680daa45378c23e71b8c69548966f64db5d231c7dfa44e1ae4b3f1f9209f3ceb89fe983ad4bb6a0df6c1b985ed694348d26b16bba9463ed84ad99879ba8372f076d444362d6f9ee7c28b28775442cb027b8775eb0832879201881047e2efc84d0322690f142ca45b129ee32aa5c5ad74331629d7a3cd13ebbeb64c3f64b8bc2e1dc673d3d676c46cdda6e6a07e6ec0b44017ba13446cf07f6eca87488160e3d8da05b1454146d1e989a7fa29a1fd3efea653d737b7b2d4fcb95deb2d2fb0c977498f6940c3e2b5d7014a923000cabf3264b052b76d31528f5ac06e6e6bff368c80a9217a490b5c9d3318ca9388282a0adc8a88225a67935ca6ffecedd8add8dd52344150a9313563db84b79067dd784551ba9ebeb57b3852b91385325162bb384e8d903e5fdf10b9b6960a85dfe0a282f0e284062471a138d05b4a2c90d52f9b6896b7e4a454e0493a709f45e75178c0a73c8e8fefe84ccfa9d86566d0548396929d012fb9443cf32e450491cc2fe68ad8bdffebbae0f1ad899012cf6459b74735b949cf24cf8b72e336283c928d8803e87e7a3f89e8c72b1bae3fa68682ce72ea699babbed8a03535e5e76aaf356483a8baa4e6202d84d5b0d1df2c052e5aa6bd5c208ab0501850fa80c6ad30dbfe94991d05fdeed14923ac3f28a7d18276c00d719645d5638215e18fb3f0e1d9fbfb0d7da233919daba1d7515eacb29b72605fc9e7ba854392bcd079f1654fbb42e9d25023a5a28ce10bdff3424f5b49b182bacef968a18789f54f137fecd3db8ae25be8894de5882c939ea1365ee50b2533fdd4135bd0a70ac3bc738c43137f7b47d6b38cd3bb1f07098ee0c0120c048dd0de5171b61c03cf585c132ceecdd6a23978d464d0c3f76f11a7103e2521090b707960e8c49714fee86f4325f038a79289a25c64e31553a7d64c8bbfe2c0057e0ee83cb4a79f18c099b6342583f951953a0a504493ee366ab1bd563dca5a777277a611b9b902d478a764a3fc84e1a2928dcce733c457c44bd70746c03b65ed0a1c6b1cf0ec74a33e26da92df97169236c6e7c794eaa2d5e2e0d068d83551d5b2c5f0ceb2f38a63773549c18af0a9f18a28c436f1af7d5a404c1acba7212609228c693ba0e7886863f2466233531a1a7c26330d8656a9f416d4b5ad81dbdc1a680b9b8d62c24942156fbc5944ce871f15f1ce76067db373f3a1c3996164e0fc5cdd7c18143604f082d29e468137ff7449df8b6d0027315456786be1558e51891ee0c70902b4afe4b115b7b1a60e15d38c0c530d771d46385dcf43a96fc6c558430b206a311947f5acd256ebc1a73438c6153b66cc948febe87a621bab05e87ce827d70b800de81b2998f6c1f7f9fa40f25b35a5fd74a9f471f237876360dea8e9d83706a65893e3472f0d3f7352b8fdf0e28ad54c7ac54bde59d51a496629d5151120737353b3530b28d6c7d3876ac6595b70a5a4e3111f49381718ed802ef4984774e4b1a1ff85ab3adcd178d7fd24adcba97f398fc8d18c00316f1a04e580ea89a7d9436bca2c09f864699e63b5d80565894dc0f45ff4e3fcb11b06075a097f75cba6309bb15620d42bb50ea12023d62f2dafbdc6c2f60c62d5e095dc71b0f6f4ae84c5a1bebb49959bebde2969dc7b7ad94056e84cdc884fc6fe009b194b0789d0766947b4410c0a42cffc8346409019bebd3dfc385f0f3bb3170dddabc209a466bd2cd8a84f44349d9f0a78dc8ab6610c3bec5405473cd0b924f728f2f5b17bbc1e7a848998ece1356d779c0871329c34abe9bbbc3bb993babd12435836fce91f4f7ceb8395d5848e0a9e32b7bf1f1f717517519a2e04c88f04822dfeed3e0f7d3a5ea7c799b6bddc139ddf22c172652ea8b909763b5cb2819d0cdec4f74108d89a5bbe23070866a3010620a71c57c2414cb3f631ad0cea613c9ef049689df6344c315b67d73a2dbe3c1baff8e42233acbd45ade601923b9fc2e634ba42b04f6ade87462f26f842d51933afe6fde73a0224db7fa5c58fff331dc7ba33c1e817083c12902a624c34a90bbc97aa3f4cd5ffe6e42cbbb7f2cfa3a434dd7f931e1c21c2e342fccb31ad72345efd51f591950176e45e2cfec7b025f31d6c01eb7b7d7a0ef08c38b66cf4826f230cfc8f021489333bb0cce768208aa5244ce44b7c52f665b531b1590e007f8c54568c2e4c385fdbe3fcc76c1037a0390076bfafe6f62af182ff7cc3c6fb8a770e8c6ef13863a56abef8ac398bfe353f747c781ca9b96bd5015ceccd6a59e204efb5ccb5e9cbee250520fa0150ed70ec772005cc3d7835b49077494cd5d3a234c409b692c41eabd92f527aa10f4146abcc3a94913b97286e6f4533914c6f1d08aad369581e59ce945e5017bb3729b1ef1e1930d1778f034590959bbfbde468d1817d8249377154c92062951e5f0d5fbf13169129a5088c3072a572ec9c1e74b255550155c24bbbef89b648f92e078e0810d0ae58ea4029d72893097694539bf42c87487d5644cdc0f74d68b0f623e292fa4c480408e28ae28af001c8f1aaf087286a8d74652b003461ed80c084b1277d5a001885c2b2e57cb48c4c0ba0adc6baa1dd016610f33207558846a9947010819ff182106cf4821fff3891892ac15bacdb8cedaaa8de554590bd8896511517044847fcb9af091b5b0098b6cf85eee80f1f3eef24dbaefd5d163a955e1554e83452c2e6f49231590a80f6ec215edb54d47aef0c16f65a4fe167e5809043ce0c19e76fdaaa60e6f42a4281572011ea3ab81fc5358893b8dbb74bc242a89a2f2107c1cae6203f6bbd96248849cf3c1d396b5f0c0ab35d51b5c1ee68a705282be16af70fa7b1952d1a3325b8ed313bf310b1a7f7ce8582ec74f546ce689965d77153be605920845e80d06121afa4f5af3faf2aa47b84ea08c96f0f46a7f488a54f2554a80dab8096fdf3875eb8b26e06e5767abbf5ba2ad439d9dad18b13bbc6a0e416a3c87ce38b0222838e3ea39e16ef438e9c808424e627bdd0bc2ff9a9b5668ff9cfd85a0daf341a87521686a6d0917b5ac46638f1fee4ff57d7f4d6f73617f885deeed62b06a0704c82fe6c59afdbe6b0b1b42f68479c08032d30782f941ad950f30ba5c0523f413e54a2fafa35c2ebdfa425c4764f1bf94b3c92a80d92c6a1e815816300d97d7c2e951f187c4c53f501886daa3eeb44ecf89f39491082b90595e3ad365a85b015171209e37435348c3e5067b61b63b178934d64245afdd23edae8d946148632059ad28e267ddeb8f2d130a98091e927b142f6400eb2455e52b5bbce108d66394c04722334130d57948a55fdcfe74c7687b9c047d6c9ec0ef6571904e00a44ab526ce4482f6757cacd6b5f211ec1b14c097ffc4f34d780a9d99fd6908966afc8b2ade27511a49a3c9efa77343d851dd396081812ab47ce4dfb7b735a38fbd76b997ba3d39574bde0c9d59744ffc95d0df5f8832c82ec7a217be832d22113ea678b4094a65b398b40f6563eada47425a7c00eb6faf400013a1b33cc6dc4cd81aa1c92020c1886f5a1e5e0d74a6d11fe2683a6c3e3247d6470a6b7f88cffdb87e5d5d3e4b09824655733e491faa3909a6717fa97a24da1705f1bfc18fac8ad0f8e0409ea6d860e85a5f1f410616d0ee04d7dd7ed8b2845aed68abdb750e8fc5f8f4c498cc58c1bfba0bd5eb06f1b62433817a4ab875b6004685ea4221792ed017fac3096f183c9eaadb6fe25ae87dc7f49f220d57dbdf6d8ab792db48fb57d4281bd2b1fa134e4172fc47e0b6b8a82301ed7f955e70db6f3cf8146f822c4d473115af4b0ca80a23d34b8a7613d850d25b1467af6b79f6c2591f77d9e04287adb8f91843736caa9cbbda00868b707074ba83847609e4000900b3ab63e98ab43b8303f12154d91d4a17c94dfaa055fb3a27101e486d8f35eaeee27b4cfbd6563c27e730695203cc4594b21687c17e547778fe8f3045ce02c3f4ea836e047caf5cfdba57cad829c83746c2ec021dd7117b908c9409c926b18d5379e17858362367c5c6c02e70607649993d8131b518fc4413c77db72d5d60ed4f146910be6c9a112684f39be8f0b80a490a6af0bd823069e8a12e9a4bb5c71ac19889fd76bc31e0e84e4d4aefbfb8cbfdb7cb9c745119e94f3c4a37b2e537a3269d5803c2bf8e0bb7c134a2c99fa0b1e9849e744b80a014b0acb2b4c87947cb1339bd1ac5137c9a8782e2ac3162ee736e30d46aeacd5e9c6d4ff8dc37c0e4b43954d86a8e21da6dffe562acc7232ea3d3f05b1ea6c1dc9275e484734c0855022acf80839d301372f3bfcb5c82c5db13f78b3bf09bf86b261b876f633280ca6e5c523644a9d3bdfaf02c07da96f866b7d25a4e6d494bbe0ad9fda5c67a192adbd8faffb2de69af2c1d59adb4cb52950cabb186551f295506d00033ff61b736bd5405bd0901b3d17aa17105c9c1afa4b5618e5e89baf8754083a62e6ebfc307bdfc08cbfa9d4752284a283fd473ac9d2279e1d9901346aa35b8c5cc25fc7319a533a89340aa031712de13d5178f74a4f1aefc895ff578e3c18d320ced1780a0e736d3c6bfed7a51b80f74b521cc0517f2a7831b180342da7139aa8f398711d0792a000b1c6541a186b73f01f2ef850257b181358f223645db5b7f7bc01ca3926b9ce760dd4bf3090da8242f911c562b294db446935bed026e875a6f37d6788734336e641c3323a5241f33cae3d0dc1d86495cd8c1b41a47787e74a310bf9602676a7ebd37f8fe87410dca1ffaa0976442a526f49f08daa4d73d3ba11a43003c84ee27fe822c75657ded006a86032dfcca706b8c7e87562a4a7831a14b98c37398a0e4fd62066a5473fbda70069888fb4e80e90be9d1afc3e2b5de3108fb2439f19b5b5a31c637ae70fc79f43c8573bdb3e3b4da4859a6482ad95ccb0274ef61f306180c48cb8f8a0a4581cdf5ddd08be9f1a1c484421de439593d0e01d69420d98b318091d43423c3bf87f47ef840dccd31f69c7f6e7f2bf1c30277b3d8272828f50a85f74eb042fc9d8f214460bc557bef3b5bac5eec08b9b95ad8f80a64223e620bcf0ba6d8888af06907a199c5ecf56408d84fe991bf1273181001a3b59157db22c766e38e88475de0206b34ed3ad658c59c63f8d491fc25913e6b02f5998e1125a991cf1b4d9896089824df1e14330f2a179a7a989c81045d649c07cd9c591ca6af365145501b77800b3744fe7a46f2ef5246aec4742d71a1a1ea20c264d3487f9ce95381dbe03b6292fd5b9130e5a322b0795b1c3d7e712f7955f4bb3112b8a0bedcfc2a20e99bdf268cb218a5"}}}}}, 0x1032) r3 = gettid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)=0x0) setpgid(r3, r4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x105400, 0x0) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x1) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0xa35e670558304825) 18:42:17 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd44408", &(0x7f0000000180), 0x6}, 0x20) 18:42:17 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x0, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='security.capability\x00', &(0x7f00000000c0)=""/23, 0x17) unshare(0x20404) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:42:17 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x240040, 0x0) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000380)={0x6, 0x5, 0x7, 0xffffffffffffba87, 0x6, 0x1}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f0000000080)) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f00000040c0), 0x1024) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x40, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r3, 0xc0105303, &(0x7f00000002c0)={0x1, 0x7fcfe4cd}) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) r4 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x6, 0x80) setsockopt$RDS_CONG_MONITOR(r4, 0x114, 0x6, &(0x7f0000000180)=0x4, 0x4) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3}, 0x90) 18:42:17 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x111481, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000040)) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f00000004c0)=@routing={0x2b, 0xc, 0x0, 0x5, 0x0, [@loopback, @remote, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}, @mcast2, @empty, @local]}, 0x68) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000003c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000480)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="000229bd5f01000000"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x4000) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x231, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x2a9) 18:42:17 executing program 7: unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) [ 527.943537] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 18:42:18 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd44408", &(0x7f0000000180), 0x6}, 0x20) 18:42:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000004\x00\x00\x00\x00,user_if=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:42:18 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000240)="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", &(0x7f0000000000)="10f33089f059e74624"}, 0x20) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:42:18 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x0, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='security.capability\x00', &(0x7f00000000c0)=""/23, 0x17) unshare(0x20404) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:42:18 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x9a) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x20040, 0x0) fanotify_mark(r0, 0x0, 0x8010010, r1, &(0x7f0000000080)='./file0\x00') r2 = socket$inet_udp(0x2, 0x2, 0x0) open$dir(&(0x7f0000000200)='./file0\x00', 0x44000, 0x10) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000180)=""/66) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) 18:42:18 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x2000000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080)}, 0x20) 18:42:18 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x2000, 0x0) mkdirat(r0, &(0x7f0000000ac0)='./file0/file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d303030303030303034303030302c757365725f6933c0f7675f4ff6a78cf9314e643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dsp\x00', 0x40040, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @local, @loopback}, &(0x7f0000000680)=0xc) stat(&(0x7f00000006c0)='./file0/file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000780)={{{@in=@multicast2, @in=@remote, 0x4e24, 0x5, 0x4e23, 0x4, 0x2, 0x80, 0x20, 0x29, r3, r4}, {0x5260, 0x4, 0x7f, 0x7, 0x7, 0x400, 0x3, 0x1}, {0x14, 0x0, 0x8, 0x1}, 0xab24, 0x6e6bba, 0x2, 0x0, 0x2}, {{@in=@local, 0x4d3, 0xff}, 0xa, @in6=@loopback, 0x34ff, 0x0, 0x3, 0x8, 0x81, 0x1, 0x6b59}}, 0xe8) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f00000030c0), 0x1000) readv(r2, &(0x7f0000000180)=[{&(0x7f0000000340)=""/163, 0xa3}, {&(0x7f0000000400)=""/252, 0xfc}, {&(0x7f0000000540)=""/171, 0xab}, {&(0x7f0000000080)=""/44, 0x2c}, {&(0x7f0000000880)=""/225, 0xe1}], 0x5) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x100}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000980)={r5, 0x2, 0xbe61}, 0x8) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r1, &(0x7f0000001000), 0x1000) 18:42:18 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x8000, 0x0) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f0000000040)) 18:42:18 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a", &(0x7f0000000180), 0x6}, 0x20) 18:42:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0xffffffffffffffd6) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0xfffffdda, 0x0, 0x6}, 0xfffffffffffffd43) get_mempolicy(&(0x7f0000000080), &(0x7f00000000c0), 0x9, &(0x7f0000ffb000/0x4000)=nil, 0x1) 18:42:18 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000090000f6ffffffffffff756c616e3000000000000000000000007663616e30000000000000000000000079616d3000000000000000000000000065727370616e300000000000000000000180c200000000000000000000000000000000000000000000007000000070000000a000000072656469726563740000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000fcffffff0100000003000000000000000000626f6e645f736c6176655f310000000069703667726574617030000000000000626f6e645f736c6176655f310000000076657468300000000000000000000000ffffffffffff0000000000000180c200000000000000000000007000000070000000a00000004e4651554555450000000000000000000000000000000000000000000000000008000000000000000000000000000000"]}, 0x248) 18:42:18 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) eventfd(0x5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:42:18 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x0, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='security.capability\x00', &(0x7f00000000c0)=""/23, 0x17) unshare(0x20404) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) [ 528.733929] kernel msg: ebtables bug: please report to author: Unknown flag for bitmask 18:42:18 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0x6, 0x7}}, 0x30) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3}, 0x90) 18:42:18 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a", &(0x7f0000000180), 0x6}, 0x20) 18:42:18 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8, 0x0) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000040)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:42:18 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x290) 18:42:19 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7, 0x400) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000100)=""/138) 18:42:19 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x0, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='security.capability\x00', &(0x7f00000000c0)=""/23, 0x17) unshare(0x20404) [ 529.091629] kernel msg: ebtables bug: please report to author: Wrong len argument 18:42:19 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a", &(0x7f0000000180), 0x6}, 0x20) 18:42:19 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x1, 0x855e, 0x4, 0x0, r0}, 0x2c) unshare(0x20400) r2 = shmget$private(0x0, 0x1000, 0x800, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_LOCK(r2, 0xb) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f0000000080)}, 0x10) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000180)={{0x3a, @local, 0x4e20, 0x4, 'rr\x00', 0x4, 0x100, 0x10}, {@multicast1, 0x4e22, 0x1, 0x1304, 0x7, 0x80000000}}, 0x44) 18:42:19 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000000)={@empty, @local}, 0x8) pwritev(r0, &(0x7f00000005c0)=[{&(0x7f00000002c0)="35cff98e1a51b606545787b8dcdd5355f62c9120288b959f974c25fc7f06ae920bb35ead578a130d9f3d978f81bceac52853c1914c2ad163a585a61851ceabde12c84b2f48f6947318d2fd69837cbd044a5931cafe9c3b93dbcc4c00f0", 0x5d}, {&(0x7f0000000340)="78bae3c093b76ee994d2167362ea8d5fa63eb5506993d4c992b545bdb00f461cb2642a74dc907f1c9dd281a37461d1d70585805ce249108579cadb2a16e05ca06332683f94b41f8656dcfa01d3679fb3a4b17d68c750f545937f046b8ba713012cbca1ca3677965e634ac663cc9d951936a662f68fdac839c7c78e259cb23df182e473593e80882d290f1fdb39d1f0691e", 0x91}, {&(0x7f0000000400)="f581e8667aa410c87e4f5208cff0cb14283887ef0bc1a3a2eb25e25b8b7d7b27c79e5f2a48c0889e176641f28e6102b7b024dfc657284420336eca98fd8b9fd37a9a6e5953e75fbe7b1ec3a1cadfde32dd56e324101e2349e47543f85718883b8848bd4a8b87a76de04167ec236de485df8a5975e119461eaba007e8f6b7e7e06ed6dbd306c926256b165c0909c5f0758ded4147", 0x94}, {&(0x7f00000004c0)="b1d88ec39e5e32cdf346078b2a6ee4957101aeb788629a5697d7b0f40c107139ef7b7c9b3e089f06019b0629b0eacea6a0fa9ccfbacc6e4fcb875b59a267eeef41fd073992f7cf3c3e2626ffeb5b503b336cffee3f728667df5370c949698f74b1bc1ce0f8cd71c37e30f51084af296eacd5786e0d547bf9471e4f7dc2cc1ec378ccdd315344663bb6d0c30181f4f5531a60bfa2392e25f7dcf14dd150377bba52cf6dfa74a0e0dfb30cd50e9a1216667fdb867f256a7a8d73fd1206f98eb90b5fef4a21602d78c5b14fc5e763dfc8b41656ead379c851a7a38d3f4f11a11240844a33965d19b5", 0xe7}], 0x4, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) getpeername$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) signalfd4(r0, &(0x7f0000000b40)={0x9}, 0x8, 0x80000) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000940)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f0000000980)={0x1}) recvfrom(r1, &(0x7f0000000180)=""/59, 0x3b, 0x1, &(0x7f0000000240)=@can={0x1d, r2}, 0x80) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000a40)=@assoc_id=0x0, &(0x7f0000000a80)=0x4) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000ac0)=@assoc_id=r4, &(0x7f0000000b00)=0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000600)=@sack_info={0x0, 0x2bd, 0x1}, &(0x7f0000000640)=0xc) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000900)={0x5e, @dev={0xac, 0x14, 0x14, 0xc}, 0x4e21, 0x2, 'sed\x00', 0x0, 0x668, 0x45}, 0x2c) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000680)={r5, 0x200}, &(0x7f00000008c0)=0x8) fsetxattr(r1, &(0x7f00000009c0)=@random={'os2.', 'selfeth0:]&\x00'}, &(0x7f0000000a00)='\'\x00', 0x2, 0x3) 18:42:19 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) clone(0x4006100, &(0x7f0000000100)="6aa416a29609857fbfb67f7866e8180eb1c38fc6a72469a404112f406dd214cb5dfd08b6402caefc1fe60d1ba7d2736e059424c02c50d1c0d09f7c5f333cc24649f33f8a33334607161063af323e4f3de180160d3bac94688083f5a4e0e99b3a213282a80418acf1f67964a3732309f10c87af9bae38df371b66b8d52cc7c014099792411729401381126d37d9d85f989468426b5174f80062e6edc49d9a507e5fc8737e6d94284867d61a069ef7a9e5dfed5980ff5a4aec63ba2f57e4c8d377ceb3ea1d5b81055bb8332101585ed5253e", &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:42:19 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x2000, 0x0) mkdirat(r0, &(0x7f0000000ac0)='./file0/file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d303030303030303034303030302c757365725f6933c0f7675f4ff6a78cf9314e643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dsp\x00', 0x40040, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @local, @loopback}, &(0x7f0000000680)=0xc) stat(&(0x7f00000006c0)='./file0/file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000780)={{{@in=@multicast2, @in=@remote, 0x4e24, 0x5, 0x4e23, 0x4, 0x2, 0x80, 0x20, 0x29, r3, r4}, {0x5260, 0x4, 0x7f, 0x7, 0x7, 0x400, 0x3, 0x1}, {0x14, 0x0, 0x8, 0x1}, 0xab24, 0x6e6bba, 0x2, 0x0, 0x2}, {{@in=@local, 0x4d3, 0xff}, 0xa, @in6=@loopback, 0x34ff, 0x0, 0x3, 0x8, 0x81, 0x1, 0x6b59}}, 0xe8) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f00000030c0), 0x1000) readv(r2, &(0x7f0000000180)=[{&(0x7f0000000340)=""/163, 0xa3}, {&(0x7f0000000400)=""/252, 0xfc}, {&(0x7f0000000540)=""/171, 0xab}, {&(0x7f0000000080)=""/44, 0x2c}, {&(0x7f0000000880)=""/225, 0xe1}], 0x5) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x100}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000980)={r5, 0x2, 0xbe61}, 0x8) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) 18:42:19 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b", &(0x7f0000000180), 0x6}, 0x20) 18:42:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) fgetxattr(r0, &(0x7f0000000080)=@random={'osx.', 'fd'}, &(0x7f0000000180)=""/98, 0x62) 18:42:19 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x0, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='security.capability\x00', &(0x7f00000000c0)=""/23, 0x17) 18:42:19 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000080)={@local, @broadcast, 0x1, 0x4, [@loopback, @multicast1, @rand_addr=0x1, @local]}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:42:19 executing program 7: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x100000000, 0x100) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e22, 0x0, @mcast2, 0xff}}, 0xffffffff, 0x1, 0x3, 0x1, 0x6}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={r1, 0x7}, &(0x7f00000001c0)=0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r2, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) fcntl$getown(r0, 0x9) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) 18:42:20 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x4000, 0x88) r2 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x963, 0x141000) ioctl$VHOST_SET_VRING_CALL(r1, 0x4008af21, &(0x7f00000002c0)={0x3, r2}) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0xfffffffffffffef4, 0xfffffffffffffffe, 0x2}, 0x10) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x40, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f00000000c0)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3}, 0x90) 18:42:20 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xffff, 0x80401) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040)={0x100000001, 0x3ff, 0x10001, 0xff}, 0x8) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) 18:42:20 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b", &(0x7f0000000180), 0x6}, 0x20) 18:42:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='security.capability\x00', &(0x7f00000000c0)=""/23, 0x17) 18:42:20 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) getresuid(&(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) getresuid(&(0x7f0000000380)=0x0, &(0x7f00000003c0), &(0x7f0000000400)) setresuid(r1, r2, r3) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) r4 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @rand_addr}, &(0x7f0000000040)=0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440)=[{0x8, 0x80000000}, {0x6, 0x5}, {0x6, 0xa13a}, {0x2, 0x3f}, {0x3, 0x7}], 0x5) 18:42:20 executing program 7: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3, 0x101000) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000104}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r2, 0x102, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffffffffff8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4841}, 0x800) unshare(0x20400) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x1, 0x200000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000540)="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", &(0x7f0000000180), 0xfffffffffffffffe}, 0x20) 18:42:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="ea6722022c50ca41b2e0abddfaa48f8c819cec63f1d55eb0d81a7059", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d04dcf7def7ea6b857aa786f12d5d73c54b9c26d0568818bab54ec4b4928bf0a047a5500a90d804042c1760bfe2d0b1a73ff991e6d80eada1c3c94eb49780301df80c5ef89da6ce87df65e6c369465b37bd461c0bf4eb1b1eb5c345b1adf3f395296f4c149fb0931359184098a4e203715a46b8d3d787de22b9c6e7be72bba4042a77e5877e26972355c6e1c29e8f44feb75e3767c221ff128277fcf697", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x5, 0x400000) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000180)={{&(0x7f0000000240)=""/139, 0x8b}, &(0x7f00000000c0)}, 0x20) openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x80000, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:42:20 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b", &(0x7f0000000180), 0x6}, 0x20) 18:42:20 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) sendto$inet(r0, &(0x7f0000000000)="fd359383826205f00ca6aec37dc4eeefe5ea5ea825062ca4d92f5a55abd56fc61944df8d8826e81f7b1dc9cf2905cce1ccce7094ddf787a826ac1fe8", 0x3c, 0x0, &(0x7f0000000040)={0x2, 0x4e24}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) 18:42:20 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x2, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x1) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x38, r2, 0x4, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xf1f}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x38}, 0x1, 0x0, 0x0, 0x24000004}, 0x24040840) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:42:20 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x2000, 0x0) mkdirat(r0, &(0x7f0000000ac0)='./file0/file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d303030303030303034303030302c757365725f6933c0f7675f4ff6a78cf9314e643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dsp\x00', 0x40040, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @local, @loopback}, &(0x7f0000000680)=0xc) stat(&(0x7f00000006c0)='./file0/file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000780)={{{@in=@multicast2, @in=@remote, 0x4e24, 0x5, 0x4e23, 0x4, 0x2, 0x80, 0x20, 0x29, r3, r4}, {0x5260, 0x4, 0x7f, 0x7, 0x7, 0x400, 0x3, 0x1}, {0x14, 0x0, 0x8, 0x1}, 0xab24, 0x6e6bba, 0x2, 0x0, 0x2}, {{@in=@local, 0x4d3, 0xff}, 0xa, @in6=@loopback, 0x34ff, 0x0, 0x3, 0x8, 0x81, 0x1, 0x6b59}}, 0xe8) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f00000030c0), 0x1000) readv(r2, &(0x7f0000000180)=[{&(0x7f0000000340)=""/163, 0xa3}, {&(0x7f0000000400)=""/252, 0xfc}, {&(0x7f0000000540)=""/171, 0xab}, {&(0x7f0000000080)=""/44, 0x2c}, {&(0x7f0000000880)=""/225, 0xe1}], 0x5) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x100}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000980)={r5, 0x2, 0xbe61}, 0x8) 18:42:20 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) ioctl$KDGETMODE(0xffffffffffffff9c, 0x4b3b, &(0x7f0000000000)) 18:42:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='security.capability\x00', &(0x7f00000000c0)=""/23, 0x17) 18:42:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)=0x6) read$FUSE(r0, &(0x7f00000030c0), 0x1000) ioctl(r0, 0x8, &(0x7f00000000c0)="167d12a38e291157ca2bc9d4575b41171e1f1f6b95c1d63e46159ef092dcf37cfdd636f686f54b9c91ebc412dc") write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:42:20 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9", &(0x7f0000000180), 0x6}, 0x20) 18:42:20 executing program 1: r0 = socket(0x12, 0x800, 0x800) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) open(&(0x7f0000000000)='./file0\x00', 0x20000, 0x0) 18:42:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0500c55965d84b0b41f515b2400a91f706167d74d2746bf7fc064372537bd498a43fc84e173601a9ba28bcd34bf6"]) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x7fffffff, 0x800) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) ioctl$RTC_PIE_ON(r1, 0x7005) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3}, 0x90) 18:42:21 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x10000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000080)={0x1, 0x1f, 0xfffffffffffffffc, 0x6}) 18:42:21 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xfffffffffffff800, 0x2000) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f0000000040)) 18:42:21 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9", &(0x7f0000000180), 0x6}, 0x20) 18:42:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x1, 0x10000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="58130000c6da9e9076173d9446bfeabca257a842a3351eaa123fabdfffedb460cf4f3ab7d2dd0cc23ff4088709771528633cb87136c364701b894f1d54cd921c56476f645e985f8ce4febfdb67818964c59021fa71ca5544d2f01a7e206849f7ef322217103e679e59e41003d4a3b8be625eee780fa65cf8ee338af237004fc6b7168f46c9a0108a0347f1c3ea0bf46f873614878463c2849260580d3e98bb3b1de80157d2f50ef78be535a648bc27ac8d6a2cdec9caff962a5c04f506ee1e175bac9761e7e6e9077cb964cb70619132c41a610ddb30caed680254c7ef795677b16d39e1741532bbd01b3ccc6df5bf", @ANYRES16=r2, @ANYBLOB="020026bd7000ffdbdf25100000000c0002000800070009000000080006000900000008000500040000002800020008000b0002000000080008000400000014000100fffffff8000000000000000000000000"], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x40000) 18:42:21 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) mkdir(&(0x7f0000578000)='./file0\x00', 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='security.capability\x00', &(0x7f00000000c0)=""/23, 0x17) 18:42:21 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x256) [ 531.212232] kernel msg: ebtables bug: please report to author: Wrong len argument [ 531.282738] kernel msg: ebtables bug: please report to author: Wrong len argument 18:42:21 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9", &(0x7f0000000180), 0x6}, 0x20) 18:42:21 executing program 7: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000080)={0x0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, @link_local}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:42:21 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x0, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='security.capability\x00', &(0x7f00000000c0)=""/23, 0x17) 18:42:21 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x2000, 0x0) mkdirat(r0, &(0x7f0000000ac0)='./file0/file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d303030303030303034303030302c757365725f6933c0f7675f4ff6a78cf9314e643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dsp\x00', 0x40040, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @local, @loopback}, &(0x7f0000000680)=0xc) stat(&(0x7f00000006c0)='./file0/file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000780)={{{@in=@multicast2, @in=@remote, 0x4e24, 0x5, 0x4e23, 0x4, 0x2, 0x80, 0x20, 0x29, r3, r4}, {0x5260, 0x4, 0x7f, 0x7, 0x7, 0x400, 0x3, 0x1}, {0x14, 0x0, 0x8, 0x1}, 0xab24, 0x6e6bba, 0x2, 0x0, 0x2}, {{@in=@local, 0x4d3, 0xff}, 0xa, @in6=@loopback, 0x34ff, 0x0, 0x3, 0x8, 0x81, 0x1, 0x6b59}}, 0xe8) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f00000030c0), 0x1000) readv(r2, &(0x7f0000000180)=[{&(0x7f0000000340)=""/163, 0xa3}, {&(0x7f0000000400)=""/252, 0xfc}, {&(0x7f0000000540)=""/171, 0xab}, {&(0x7f0000000080)=""/44, 0x2c}, {&(0x7f0000000880)=""/225, 0xe1}], 0x5) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x100}, &(0x7f00000002c0)=0x8) 18:42:21 executing program 0: fstat(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0xd, 0x7, 0x4, 0x1}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000000), &(0x7f0000000180)}, 0xfffffffffffffe0a) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f0000000080)}, 0x10) rt_sigsuspend(&(0x7f0000000080)={0x80000001}, 0x8) 18:42:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="66643d7c29432db983ecfb45020d912938e0199c28b35c25eba661784ff513d426f1cfaf66f8bc0627ccc3019eb9b178e1d6535fceb88de5989a0c43caf6cc3e58f97aa863251fb5f00e3767539e2418d98258ddce4ca305b280dcee26bd81e58b3648518c7df44233d27622cc0bf739bf52b617dd71d4935193df6f7a364417577dd696cbf195e29f867ab28795f2751ebd91c4e45a92fcb94a48c4ee684f0af2c5fca816d5ae8eed3a499d770bc11c819f0e6df2e7", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67720e14270dd75743", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3}, 0x90) 18:42:21 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x2e3) 18:42:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000080)={0x50, 0x0, 0x4, {0x7, 0x1b, 0x469, 0x90800, 0xdc6, 0x5, 0x3f, 0x20}}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x40, 0x0) ioctl$KDMKTONE(r1, 0x4b30, 0x80000001) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:42:21 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498", &(0x7f0000000180), 0x6}, 0x20) [ 531.701166] kernel msg: ebtables bug: please report to author: Wrong len argument 18:42:21 executing program 7: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000040)={0xfffffffffffffe01, 0x3, 0x100000000000009}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x4000000000005, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20402) splice(r0, &(0x7f0000000080)=0x3, r1, &(0x7f0000000100), 0x6, 0x1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000140)={0x7, 0x800, 0x6}) 18:42:21 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x0, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='security.capability\x00', &(0x7f00000000c0)=""/23, 0x17) 18:42:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x6}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3}, 0x90) 18:42:21 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x228, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f00000000c0), &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x31b) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='cgroup\x00') ioctl$RTC_PIE_OFF(r1, 0x7006) 18:42:22 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498", &(0x7f0000000180), 0x6}, 0x20) [ 532.087956] kernel msg: ebtables bug: please report to author: Wrong len argument 18:42:22 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/icmp\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000180)=0xc) r2 = getgid() write$FUSE_ATTR(r0, &(0x7f0000000340)={0x78, 0x0, 0x5, {0x6, 0x4, 0x0, {0x2, 0x6, 0x4, 0x3ff, 0x1000, 0x6, 0x2, 0x8, 0x1, 0x7ff, 0xdd2, r1, r2, 0x1000, 0x8000}}}, 0x78) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780), 0x4) r4 = fcntl$getown(0xffffffffffffffff, 0x9) fcntl$setown(r3, 0x8, r4) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r5, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r5, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r5, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r5, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) [ 532.129343] kernel msg: ebtables bug: please report to author: Wrong len argument 18:42:22 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000000)) 18:42:22 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x0, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='security.capability\x00', &(0x7f00000000c0)=""/23, 0x17) 18:42:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x2, &(0x7f0000fff000/0x1000)=nil) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) 18:42:22 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498", &(0x7f0000000180), 0x6}, 0x20) 18:42:22 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x2000, 0x0) mkdirat(r0, &(0x7f0000000ac0)='./file0/file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d303030303030303034303030302c757365725f6933c0f7675f4ff6a78cf9314e643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dsp\x00', 0x40040, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @local, @loopback}, &(0x7f0000000680)=0xc) stat(&(0x7f00000006c0)='./file0/file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000780)={{{@in=@multicast2, @in=@remote, 0x4e24, 0x5, 0x4e23, 0x4, 0x2, 0x80, 0x20, 0x29, r3, r4}, {0x5260, 0x4, 0x7f, 0x7, 0x7, 0x400, 0x3, 0x1}, {0x14, 0x0, 0x8, 0x1}, 0xab24, 0x6e6bba, 0x2, 0x0, 0x2}, {{@in=@local, 0x4d3, 0xff}, 0xa, @in6=@loopback, 0x34ff, 0x0, 0x3, 0x8, 0x81, 0x1, 0x6b59}}, 0xe8) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f00000030c0), 0x1000) readv(r2, &(0x7f0000000180)=[{&(0x7f0000000340)=""/163, 0xa3}, {&(0x7f0000000400)=""/252, 0xfc}, {&(0x7f0000000540)=""/171, 0xab}, {&(0x7f0000000080)=""/44, 0x2c}, {&(0x7f0000000880)=""/225, 0xe1}], 0x5) 18:42:22 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 18:42:22 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) r1 = dup(r0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000000)={0x5, [0x7f, 0x6, 0xbd01, 0x1, 0x556b]}, &(0x7f0000000040)=0xe) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) 18:42:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2893"]) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8000, 0x102) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000340)="e5377e19de974274b84678d2cad0117d97ea053c67e6f37d6d2958ea7eb086e9c9fb8e670758dd6fd153e072a886390f4d909d67890346de47a40f3af31621c2c28a552decfafac037a2168d016bcf88dfe3368e3c7019610473c7cc72785ea543fab6e3156e8e01ac4e321217e95bce46fe6ba10046c94472105ec38f2b75a99f8492b462c0f29f1ec173162378b08c8a159a2bf30349b350ea07d5742602d56e2f4412a24bddc8dc2c0a423c1cca2094c5b1fd5b49ee173ae664e1db57cadf481f80fb2972e24d") write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:42:22 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498f46e9a", &(0x7f0000000180), 0x6}, 0x20) 18:42:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x1, 0x188, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200003c0], 0x0, &(0x7f00000000c0), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x2c, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @empty, [], 0xb0, 0xb0, 0xf8, [@mark_m={'mark_m\x00', 0x18, {{0xe4f, 0x1, 0x1, 0x3}}}]}}, @common=@ERROR={'ERROR\x00', 0x20, {"63754052b5628f9622db837b96262b2b2eb2283a0e386825da8accc4e436"}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x200) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x20, 0x400000) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000040)) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x10) 18:42:22 executing program 4: mkdir(&(0x7f0000578000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x0, 0x0) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='security.capability\x00', &(0x7f00000000c0)=""/23, 0x17) 18:42:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) creat(&(0x7f0000000080)='\x00', 0x4) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3}, 0x90) 18:42:23 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498f46e9a", &(0x7f0000000180), 0x6}, 0x20) 18:42:23 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$VT_DISALLOCATE(r1, 0x5608) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 18:42:23 executing program 7: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40000, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000240)="1823248227258aeff6fd841f373ab7f41a45a61fa3ff50dc0dd1687d98d218c69da935d5d495fed6112defbfacbf0e79169d01305be9a911c65a94c9c8258a070249711b5eb6e6ccd5fce4719f58b58ff0b39026739b9b8140862a8875686021a63e9460ee23ee0f2a40d4dc11132ec41d59a0aaeaed54a2c8c236cbb1e852bb5748e00120c307f2b51a8fc79dfa2fade44e0e77672b9b7b65d27d43a3ca5c4219c8d0417fa97054229ad07e8cd46f7cdbad3df83b8c9cc66ec7eed16692be404aa0", &(0x7f0000000080)="34b7b43b6c7ab68dba7dfba28d"}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x4000000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r1, &(0x7f0000000100)="e3983d0fe353232e712f231d07b21e3ea9bf4bc2bf891ec444f79a8354c3e50443da03dca62f92a00f89b6f493f8c69ba5c4957f768c8bc28086a8222a42db666fd96f6e8640934eb9b94008ac8bad475e43953b40a01e65e0e825008f63cdb33a6526adb9ec89df251b85e6abf77ed87adc90dc58f095be3092a4dc622123ebab9ce519bae0", &(0x7f0000000000)="ddb4262fa6b794e9aa65"}, 0x20) 18:42:23 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x0, 0x80000001, 0x1, 0x2, 0x8000, 0x7}) r1 = socket$bt_rfcomm(0x1f, 0x3, 0x3) r2 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x1ff, 0x10000) connect$vsock_stream(r2, &(0x7f00000001c0)={0x28, 0x0, 0x2710}, 0x10) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000040)=0x2, &(0x7f0000000080)=0x2) 18:42:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00175c9bbc731ca1f659a84d8e75c54d7395584dabf66d3d7d7ec3b381b59ba51aca2dff756cf22d4195769ad85e63e33dccecdeb5c11813bc2f930330b2f95f126c80a7e38de7e85bd8bc51c89f4e5ed0a6a39a3ba1aa798ab0ac4dd3d84d00858d8a2d235e", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grkup_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) r1 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x6a19, 0x200) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f0000000540)) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x6, 0x503440) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x5}, 0x10) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x305000, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r2, 0x401870cc, &(0x7f00000000c0)={0x1, 0x1, 0xfffffffffffffffb, 0x3}) 18:42:23 executing program 4: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @remote}}}, 0x90) 18:42:23 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498f46e9a", &(0x7f0000000180), 0x6}, 0x20) 18:42:23 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0x0) keyctl$update(0x2, r1, &(0x7f0000000180)="badac3ae3baf29d91f6750955f54b16d3a519cf0d8adce47d40a3d6d10f14172a40f721da1ac0f688714550473a1e7292def42875eaccbeccbb80268f8452ee8e564f1ea1b660e246d3164f6504bc48d1b0981cd38924420cdfb5981f1f62a66c4b33b9ccbea87", 0x67) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000006c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x248) r2 = semget(0x0, 0x4, 0x110) semctl$SEM_INFO(r2, 0x3, 0x13, &(0x7f0000000380)=""/76) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x200, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000340)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000200)={0x0, 0x5a, 0x1, [0x3]}, &(0x7f0000000240)=0xa) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f0000000280)={r5, 0x7, 0x0, 0xfffffffffffffeff, 0x34}, &(0x7f00000002c0)=0x18) 18:42:23 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x2000, 0x0) mkdirat(r0, &(0x7f0000000ac0)='./file0/file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d303030303030303034303030302c757365725f6933c0f7675f4ff6a78cf9314e643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dsp\x00', 0x40040, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @local, @loopback}, &(0x7f0000000680)=0xc) stat(&(0x7f00000006c0)='./file0/file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000780)={{{@in=@multicast2, @in=@remote, 0x4e24, 0x5, 0x4e23, 0x4, 0x2, 0x80, 0x20, 0x29, r3, r4}, {0x5260, 0x4, 0x7f, 0x7, 0x7, 0x400, 0x3, 0x1}, {0x14, 0x0, 0x8, 0x1}, 0xab24, 0x6e6bba, 0x2, 0x0, 0x2}, {{@in=@local, 0x4d3, 0xff}, 0xa, @in6=@loopback, 0x34ff, 0x0, 0x3, 0x8, 0x81, 0x1, 0x6b59}}, 0xe8) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) readv(r2, &(0x7f0000000180)=[{&(0x7f0000000340)=""/163, 0xa3}, {&(0x7f0000000400)=""/252, 0xfc}, {&(0x7f0000000540)=""/171, 0xab}, {&(0x7f0000000080)=""/44, 0x2c}, {&(0x7f0000000880)=""/225, 0xe1}], 0x5) 18:42:23 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x6, 0x4000) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000040)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) dup(r0) ioctl$TCSBRK(r1, 0x5409, 0x0) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = geteuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000240)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000280)={{{@in=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000004c0)=0xe8) getgroups(0x2, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff]) fstat(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r1, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000010003000000000002000300", @ANYRES32=r2, @ANYBLOB="02000200", @ANYRES32=r3, @ANYBLOB="02000700", @ANYRES32=r4, @ANYBLOB="02000400", @ANYRES32=r5, @ANYBLOB="2558891613ea359d88558f059d02000200f527f38062bed7c5a23efee951d248a7d51e70747e26b5daac11ea7c9e7e74d7082b758018cf1ea969ffb149de278d8fe3099a330189ccdc71028ef8d46697ca8d48851cef1c1a91ad76a6b1287d9d57c1d28a31af41017b808a64186319781d448c2f77204f8fcd515d", @ANYRES32=r6, @ANYBLOB="040001000000000008000200", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="10000000000000002000070000000000"], 0x5c, 0x2) 18:42:23 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000000), &(0x7f0000000180), 0x40000}, 0x20) 18:42:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757373045c9930a4", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x1f, 0x802) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000340)=""/240, 0x1000, 0x1800, 0x6}, 0x18) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 18:42:23 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xd1, &(0x7f0000c4c000)=0x9, 0x4) getsockopt$inet6_int(r0, 0x29, 0x4000000000cf, &(0x7f0000000240), &(0x7f0000000200)=0x4) 18:42:23 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498f46e9a57", &(0x7f0000000180), 0x6}, 0x20) 18:42:23 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]}, 0x2ee) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) r1 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_bt(r1, 0xdd17, &(0x7f0000000100)="d52b097fc8443434b2ec48e0149d5325a52199eab00c0d8ef83f8ef5729db42c2ef54bfba4105b92668772a8fbc1e82d173f7e12a4bd7e49bdd37d981ffb47309ebec4473fb9995adf8ec7caa2dac5f6aa964361e5829def68cfa9eee33f5c477375d81a16f79086631ca52445293bf83344ab3d5639a223c742e2dc8c10177c63b1ab3182385b4f") [ 534.089073] kernel msg: ebtables bug: please report to author: Wrong len argument [ 534.150313] kernel msg: ebtables bug: please report to author: Wrong len argument 18:42:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x7fffffff, 0x4, 0x844, 0xffffffffffffff29, 0x8}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3}, 0x90) 18:42:24 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0xfffffcac) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000100)={'teql0\x00', 0x2449}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20}}, [0xa6c0, 0x80000001, 0x8, 0x7, 0x3, 0xa3d, 0x7fffffff, 0x5, 0x110, 0x1, 0x0, 0xfffffffffffffff9, 0x5, 0x0, 0x3]}, &(0x7f0000000180)=0x100) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000001c0)={r2, 0x8, 0x10}, &(0x7f0000000340)=0xc) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) r3 = msgget(0x2, 0x200) msgrcv(r3, &(0x7f0000000380)={0x0, ""/191}, 0xc7, 0x0, 0x1800) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) 18:42:24 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x9, 0x7, 0x1000}, 0x2c) unshare(0x20400) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$TIOCLINUX3(r1, 0x541c, &(0x7f0000000080)) sync() unshare(0x40000000) ioctl$UI_DEV_CREATE(r2, 0x5501) 18:42:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x9) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000040)={0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, 0x80}) 18:42:24 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000100)="f5770795ce1d2deb4292e0bd14f1d5497e60a307fd749ba28bededab5b324335d40a920d269518fe9864f10d9a6224fc41528c8d9407eadcc0118df309e8024a4414ea186b2badc460ea4e01fdfc560b6d3468195f0bd4440866141227e0ebe4da8a4e08476dee88f969a2689b5fd52cf78016d338956b94715457e97b31ac0a588daef70a4e0e5af586fa2e17ffc7cf6db2a4874d7fb9e86d127b1d5b44c2971fa130f0c4e9ee1d0e1b7498f46e9a57", &(0x7f0000000180), 0x6}, 0x20) 18:42:24 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x1d0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f00000000c0), &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x3c9) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r2 = syz_open_dev$admmidi(&(0x7f0000000540)='/dev/admmidi#\x00', 0x76, 0x401) ioctl$UI_BEGIN_FF_UPLOAD(r2, 0xc06855c8, &(0x7f0000000580)={0xf, 0x0, {0x57, 0x10000000, 0x4, {0x2, 0x9}, {0x348000000, 0x3}, @const={0x100000001, {0x2, 0x7e, 0xc35, 0x1ff}}}, {0x54, 0x5, 0x3, {0x100000000, 0x5}, {0x1f, 0x4}, @rumble={0x40, 0xffffffffffffffff}}}) r3 = add_key(&(0x7f00000006c0)='.dead\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000640)="a6c8bec710f2be1bee9f5211b418109a77c7bebd64282adfda6ac20b27b174e5017e4c829d4ce1768add28baad4f4d59e9b1532fa320ca3162e335acd7a5e5109e6886a22b024a4fb6ef8d466fc39a9980881dee1f39aa7c37cc9c702a7a6ba2897e78", 0x63, 0xfffffffffffffff9) keyctl$link(0x8, r1, r3) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000600)=0x2, 0x8) r4 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x1, 0x400) getsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000200), &(0x7f0000000300)=0x8) write$FUSE_STATFS(r4, &(0x7f0000000280)={0x60, 0x0, 0x4, {{0x0, 0xfffffffffffffc01, 0x8, 0x3, 0x2, 0x8, 0x3, 0xff}}}, 0x60) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) 18:42:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$inet_mreqsrc(r1, 0x6, 0x2000000000000001, &(0x7f0000013ff4)={@remote, @rand_addr, @multicast2}, 0xc) close(r1) socket$inet6(0xa, 0x1000000000002, 0x0) dup3(r1, r2, 0x0) [ 534.422123] IPVS: ftp: loaded support on port[0] = 21 18:42:24 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x2000, 0x0) mkdirat(r0, &(0x7f0000000ac0)='./file0/file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d303030303030303034303030302c757365725f6933c0f7675f4ff6a78cf9314e643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dsp\x00', 0x40040, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @local, @loopback}, &(0x7f0000000680)=0xc) stat(&(0x7f00000006c0)='./file0/file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000780)={{{@in=@multicast2, @in=@remote, 0x4e24, 0x5, 0x4e23, 0x4, 0x2, 0x80, 0x20, 0x29, r3, r4}, {0x5260, 0x4, 0x7f, 0x7, 0x7, 0x400, 0x3, 0x1}, {0x14, 0x0, 0x8, 0x1}, 0xab24, 0x6e6bba, 0x2, 0x0, 0x2}, {{@in=@local, 0x4d3, 0xff}, 0xa, @in6=@loopback, 0x34ff, 0x0, 0x3, 0x8, 0x81, 0x1, 0x6b59}}, 0xe8) readv(r2, &(0x7f0000000180)=[{&(0x7f0000000340)=""/163, 0xa3}, {&(0x7f0000000400)=""/252, 0xfc}, {&(0x7f0000000540)=""/171, 0xab}, {&(0x7f0000000080)=""/44, 0x2c}, {&(0x7f0000000880)=""/225, 0xe1}], 0x5) 18:42:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030010001000000000030302c757365725f69649238b20d3f", @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643dfac75c", @ANYRESDEC=0x0, @ANYBLOB="964f14bf5e5156"]) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0xffff, 0x210040) accept4$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14, 0x80800) 18:42:24 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0x4}, 0x2c) unshare(0x20400) r1 = semget(0x1, 0x3, 0x42) semctl$SEM_STAT(r1, 0x4, 0x12, &(0x7f0000000240)=""/211) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000080)}, 0x10) [ 534.544441] kernel msg: ebtables bug: please report to author: Wrong len argument [ 534.618886] kernel msg: ebtables bug: please report to author: Wrong len argument [ 534.637178] ================================================================== [ 534.644627] BUG: KMSAN: uninit-value in math_error+0x330/0x620 [ 534.650631] CPU: 1 PID: 24605 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #42 [ 534.657925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 534.667418] Call Trace: [ 534.670039] dump_stack+0x14b/0x190 [ 534.673704] kmsan_report+0x183/0x2b0 [ 534.677544] __msan_warning+0x70/0xc0 [ 534.681413] math_error+0x330/0x620 [ 534.681437] ? kmsan_memcpy_origins+0x111/0x1b0 [ 534.681491] do_coprocessor_error+0x29/0x30 [ 534.681516] coprocessor_error+0x14/0x20 [ 534.681541] RIP: 0010:fpu__drop+0x27f/0x510 [ 534.681563] Code: 02 00 00 48 8b 7d c0 8a 1f e8 1d 13 b4 00 8a 00 84 c0 74 0a f6 d0 20 d8 0f 84 15 02 00 00 84 db 0f 84 1c 02 00 00 4c 89 75 b8 <9b> 65 48 c7 04 25 58 fc 02 00 00 00 00 00 8b 1c 25 b8 27 01 8a 48 [ 534.681575] RSP: 0000:ffff88003130fc88 EFLAGS: 00010202 [ 534.681596] RAX: ffff88003f475500 RBX: ffff880037e4d501 RCX: ffff88003f46d504 [ 534.681611] RDX: ffff88003f46d504 RSI: aaaaaaaaaaaab000 RDI: ffffea00014f5ce0 [ 534.681624] RBP: ffff88003130fcd8 R08: 0000000000480020 R09: 0000000000000002 [ 534.681637] R10: ffff88003130fe10 R11: 0000000000000000 R12: 0000000000000000 [ 534.681651] R13: ffff880037e4c400 R14: ffff880037e4d500 R15: 0000000000000000 [ 534.681693] ? fpu__drop+0x263/0x510 [ 534.681725] fpu__clear+0x52/0x300 [ 534.681754] do_signal+0x1ace/0x2060 [ 534.681837] prepare_exit_to_usermode+0x273/0x410 [ 534.681862] ? page_fault+0x8/0x30 [ 534.681884] retint_user+0x8/0x8 [ 534.681901] RIP: 0033:0x4062f0 [ 534.681920] Code: 48 33 0c 25 28 00 00 00 0f b6 44 24 05 75 10 48 83 c4 10 5b c3 bf f6 1f 4c 00 e8 0b c3 ff ff e8 26 49 05 00 66 0f 1f 44 00 00 <53> 48 8b 76 10 89 fb 64 8b 04 25 d0 ff ff ff 85 c0 74 3d 48 8d 86 [ 534.681931] RSP: 002b:0000000000a3f638 EFLAGS: 00000246 [ 534.681950] RAX: 0000000000000000 RBX: fffffffffffffffe RCX: 0000000000000000 [ 534.681963] RDX: 0000000000a3f640 RSI: 0000000000a3f770 RDI: 000000000000000b [ 534.681976] RBP: 0000000000930aa0 R08: 0000000000000000 R09: 0000000000000000 [ 534.681989] R10: 0000000000a3fcf0 R11: 0000000000000246 R12: 00000000000003e8 [ 534.682002] R13: 00000000009300ac R14: 00000000000828a5 R15: 0000000000082878 [ 534.682028] [ 534.682038] Local variable description: ----env.i@copy_fpstate_to_sigframe [ 534.682044] Variable was created at: [ 534.682061] copy_fpstate_to_sigframe+0x69/0xbb0 [ 534.682079] do_signal+0xe4d/0x2060 [ 534.682087] ================================================================== [ 534.682094] Disabling lock debugging due to kernel taint [ 534.682105] Kernel panic - not syncing: panic_on_warn set ... [ 534.682105] [ 534.682128] CPU: 1 PID: 24605 Comm: syz-executor4 Tainted: G B 4.19.0-rc1+ #42 [ 534.682158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 534.909705] Call Trace: [ 534.912323] dump_stack+0x14b/0x190 [ 534.915976] panic+0x35d/0x8cb [ 534.919208] ? do_signal+0xe4d/0x2060 [ 534.923039] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 534.928513] kmsan_report+0x2a8/0x2b0 [ 534.932340] __msan_warning+0x70/0xc0 [ 534.936168] math_error+0x330/0x620 [ 534.940285] ? kmsan_memcpy_origins+0x111/0x1b0 [ 534.945048] do_coprocessor_error+0x29/0x30 [ 534.949386] coprocessor_error+0x14/0x20 [ 534.953466] RIP: 0010:fpu__drop+0x27f/0x510 [ 534.957820] Code: 02 00 00 48 8b 7d c0 8a 1f e8 1d 13 b4 00 8a 00 84 c0 74 0a f6 d0 20 d8 0f 84 15 02 00 00 84 db 0f 84 1c 02 00 00 4c 89 75 b8 <9b> 65 48 c7 04 25 58 fc 02 00 00 00 00 00 8b 1c 25 b8 27 01 8a 48 [ 534.976842] RSP: 0000:ffff88003130fc88 EFLAGS: 00010202 [ 534.982231] RAX: ffff88003f475500 RBX: ffff880037e4d501 RCX: ffff88003f46d504 [ 534.989523] RDX: ffff88003f46d504 RSI: aaaaaaaaaaaab000 RDI: ffffea00014f5ce0 [ 534.996810] RBP: ffff88003130fcd8 R08: 0000000000480020 R09: 0000000000000002 [ 535.004088] R10: ffff88003130fe10 R11: 0000000000000000 R12: 0000000000000000 [ 535.011368] R13: ffff880037e4c400 R14: ffff880037e4d500 R15: 0000000000000000 [ 535.018692] ? fpu__drop+0x263/0x510 [ 535.022437] fpu__clear+0x52/0x300 [ 535.026001] do_signal+0x1ace/0x2060 [ 535.029785] prepare_exit_to_usermode+0x273/0x410 [ 535.034667] ? page_fault+0x8/0x30 [ 535.038223] retint_user+0x8/0x8 [ 535.041599] RIP: 0033:0x4062f0 [ 535.044813] Code: 48 33 0c 25 28 00 00 00 0f b6 44 24 05 75 10 48 83 c4 10 5b c3 bf f6 1f 4c 00 e8 0b c3 ff ff e8 26 49 05 00 66 0f 1f 44 00 00 <53> 48 8b 76 10 89 fb 64 8b 04 25 d0 ff ff ff 85 c0 74 3d 48 8d 86 [ 535.063733] RSP: 002b:0000000000a3f638 EFLAGS: 00000246 [ 535.069123] RAX: 0000000000000000 RBX: fffffffffffffffe RCX: 0000000000000000 [ 535.076407] RDX: 0000000000a3f640 RSI: 0000000000a3f770 RDI: 000000000000000b [ 535.083685] RBP: 0000000000930aa0 R08: 0000000000000000 R09: 0000000000000000 [ 535.090962] R10: 0000000000a3fcf0 R11: 0000000000000246 R12: 00000000000003e8 [ 535.098244] R13: 00000000009300ac R14: 00000000000828a5 R15: 0000000000082878 [ 535.105904] Dumping ftrace buffer: [ 535.109446] (ftrace buffer empty) [ 535.113145] Kernel Offset: disabled [ 535.116766] Rebooting in 86400 seconds..